ricardojoserf / BOF_FilesLinks
Repository to gather the BOF files I will be developing
☆10Updated 9 months ago
Alternatives and similar repositories for BOF_Files
Users that are interested in BOF_Files are comparing it to the libraries listed below
Sorting:
- Example of using Sleep to create better named pipes.☆41Updated last year
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35Updated last year
- A simple rpc2socks alternative in pure Go.☆28Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Scripts to interact with Microsoft Graph APIs☆43Updated 8 months ago
- BOF for C2 framework☆41Updated 8 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated 2 weeks ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 4 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆35Updated 2 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆48Updated 2 years ago
- ☆19Updated 7 months ago
- ELF Beacon Object File (BOF) Template☆19Updated 7 months ago
- A pure C version of SymProcAddress☆28Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- The Totally Legit Authentication Dialog☆12Updated last year
- Cobalt Strike notifications via NTFY.☆14Updated 9 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated 11 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆14Updated 4 months ago
- ☆23Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆16Updated 8 months ago
- ☆18Updated 6 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆24Updated last month
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆16Updated 3 months ago
- Beacon Object Files used for Cobalt Strike☆19Updated last year