ricardojoserf / BOF_FilesLinks
Repository to gather the BOF files I will be developing
☆10Updated last year
Alternatives and similar repositories for BOF_Files
Users that are interested in BOF_Files are comparing it to the libraries listed below
Sorting:
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆44Updated last year
- ☆19Updated last year
- A simple rpc2socks alternative in pure Go.☆31Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Updated 8 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- Windows Access token manipulation tool made in C#☆24Updated 3 months ago
- ☆23Updated last year
- ☆49Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Updated 9 months ago
- DFSCoerce exe revisited version with custom authentication☆41Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 8 months ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- ☆47Updated 2 years ago
- Cobalt Strike notifications via NTFY.☆15Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Updated 2 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 8 months ago
- ☆61Updated last year
- in-process powershell runner for BRC4☆48Updated 2 years ago
- The Totally Legit Authentication Dialog☆12Updated 2 years ago