Repository to gather the BOF files I will be developing
☆11Oct 1, 2024Updated last year
Alternatives and similar repositories for BOF_Files
Users that are interested in BOF_Files are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 weeks ago
- BypassCredGuard CS BOF☆51Jan 23, 2025Updated last year
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated last year
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated 11 months ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆31Jan 30, 2025Updated last year
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- ☆19Sep 17, 2025Updated 6 months ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 9 months ago
- This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due…☆18Jan 24, 2024Updated 2 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 6 years ago
- Three different shellcode techniques on the Windows Kernel☆15Apr 8, 2025Updated 11 months ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆100Jun 24, 2024Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- ☆41Jul 10, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆98Mar 20, 2023Updated 3 years ago
- All Apprentice and Practitioner-level Portswigger labs☆32May 18, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Winsocket for Cobalt Strike.☆104Jul 6, 2023Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- ☆110Feb 17, 2025Updated last year
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆14May 1, 2020Updated 5 years ago