passthehashbrowns / BOFMask
☆119Updated last year
Alternatives and similar repositories for BOFMask:
Users that are interested in BOFMask are comparing it to the libraries listed below
- Implant drop-in for EDR testing☆135Updated last year
- ☆125Updated 6 months ago
- ☆125Updated last year
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- ☆127Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆83Updated 2 years ago
- ☆154Updated last year
- ☆120Updated last year
- ☆133Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- Simple BOF to read the protection level of a process☆114Updated last year
- AzureAD beacon object files☆117Updated 3 months ago
- TypeLib persistence technique☆108Updated 5 months ago
- ☆140Updated last year
- ☆95Updated 6 months ago
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- Lateral Movement via the .NET Profiler☆80Updated 4 months ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆226Updated last year
- ☆96Updated 2 months ago
- An App Domain Manager Injection DLL PoC on steroids☆167Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated last year
- ☆78Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆93Updated last year
- C# porting of SysWhispers2. It uses SharpASM to find the code caves for executing the system call stub.☆103Updated last year
- Beacon Object File allowing creation of Beacons in different sessions.☆79Updated 2 years ago
- ☆181Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆82Updated 2 months ago