pwn1sher / CS-BOFsLinks
Collection of CobaltStrike beacon object files
☆105Updated 3 years ago
Alternatives and similar repositories for CS-BOFs
Users that are interested in CS-BOFs are comparing it to the libraries listed below
Sorting:
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆146Updated 4 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆126Updated 3 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆100Updated 5 years ago
- ☆94Updated 3 years ago
- ☆98Updated 4 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆121Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆105Updated 4 years ago
- Cobalt Strike Beacon Object Files☆167Updated 3 years ago
- ☆67Updated 3 years ago
- ☆59Updated 4 years ago
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆173Updated 4 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆89Updated 4 years ago
- nuke that event log using some epic dinvoke fu☆118Updated 4 years ago
- ☆142Updated 3 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆119Updated 5 years ago
- ☆70Updated 4 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆223Updated 5 years ago
- DLL Hijack Search Order Enumeration BOF☆151Updated 4 years ago
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆101Updated 3 years ago
- Cobalt Strike BOF Files with Nim!☆86Updated 3 years ago
- UI for creating LNKs☆105Updated 4 years ago
- PoC to interact with local/remote registry hives through WMI☆87Updated 5 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Updated 4 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated last year
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆188Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆101Updated 3 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- ☆152Updated 2 years ago