nettitude / RunOF
☆141Updated 2 years ago
Alternatives and similar repositories for RunOF:
Users that are interested in RunOF are comparing it to the libraries listed below
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆117Updated 2 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆90Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆113Updated 3 years ago
- A simple BOF that frees UDRLs☆114Updated 2 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆135Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆78Updated 2 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆84Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆98Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆154Updated last year
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆137Updated 3 years ago
- ☆138Updated last year
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆84Updated 2 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆98Updated last year
- Collection of CobaltStrike beacon object files☆101Updated 2 years ago
- Implant drop-in for EDR testing☆131Updated last year
- Writeup of Payload Techniques in C involving Mutants, Session 1 -> Session 0 migration, and Self-Deletion of payloads.☆123Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆179Updated 2 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆120Updated 3 years ago
- UI for creating LNKs☆96Updated 3 years ago
- ☆138Updated 2 years ago
- Exploring in-memory execution of .NET☆135Updated 2 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆174Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆161Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆63Updated 3 months ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆99Updated 4 years ago