A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.
☆265Sep 23, 2025Updated 6 months ago
Alternatives and similar repositories for BamboozlEDR
Users that are interested in BamboozlEDR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆44Sep 16, 2025Updated 6 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆310Mar 31, 2025Updated 11 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆214Aug 21, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- TypeLib persistence technique☆141Oct 22, 2024Updated last year
- A tool to transform Chromium browsers into a C2 Implant☆565Dec 17, 2025Updated 3 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Group Policy Objects manipulation and exploitation framework☆300Dec 7, 2025Updated 3 months ago
- A BOF that's a BOF Loader and more☆201Jan 17, 2026Updated 2 months ago
- An example reference design for a proposed BOF PE☆204Jan 23, 2026Updated 2 months ago
- Collect Windows telemetry for Maldev☆465Jan 30, 2026Updated last month
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆462Aug 2, 2024Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆191Mar 19, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- Cobalt Strike UDRL for memory scanner evasion.☆1,009Jun 4, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆347Nov 19, 2024Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- ☆59Oct 24, 2024Updated last year
- Lateral Movement Bof with MSI ODBC Driver Install☆148Sep 30, 2025Updated 5 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆128Jan 17, 2026Updated 2 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 4 months ago
- A reflective DLL development template for the Rust programming language☆117Nov 4, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 9 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A BOF that runs unmanaged PEs inline☆687Oct 23, 2024Updated last year
- ☆57Apr 19, 2023Updated 2 years ago
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆294Nov 1, 2025Updated 4 months ago
- ☆409Dec 8, 2024Updated last year
- LPE / RCE Exploits for various vulnerable "Bloatware" products☆87Aug 5, 2025Updated 7 months ago
- UDC2 implementation that provides an ICMP C2 channel☆118Nov 24, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Aims to identify sleeping beacons☆664Jan 25, 2026Updated 2 months ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- An Ansible collection that installs an SCCM deployment with optional configurations.☆102Dec 8, 2025Updated 3 months ago
- ☆160Jan 27, 2025Updated last year
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated 2 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆327Oct 20, 2025Updated 5 months ago