paranoidninja / BRC4-BOF-Artillery
☆102Updated last week
Alternatives and similar repositories for BRC4-BOF-Artillery:
Users that are interested in BRC4-BOF-Artillery are comparing it to the libraries listed below
- Adversary Emulation Framework☆92Updated 8 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆171Updated last month
- ☆105Updated 2 months ago
- AzureAD beacon object files☆115Updated 3 months ago
- ☆121Updated last year
- ☆148Updated 8 months ago
- ForsHops☆63Updated last week
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆150Updated 2 weeks ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- A Mythic agent for Windows written in C☆104Updated this week
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆118Updated last month
- ☆95Updated 7 months ago
- BOF with Synthetic Stackframe☆137Updated last month
- ☆125Updated 7 months ago
- ☆111Updated 2 weeks ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆118Updated 5 months ago
- ☆158Updated this week
- Port of Cobalt Strike's Process Inject Kit☆171Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆85Updated 9 months ago
- ☆150Updated 3 months ago
- ☆119Updated last year
- Lateral Movement via the .NET Profiler☆79Updated 4 months ago
- ☆109Updated 4 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆107Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆111Updated this week
- Stage 0☆154Updated 3 months ago
- Lateral Movement☆122Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆81Updated 2 months ago
- ☆181Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year