rsmudge / unhook-bof
Remove API hooks from a Beacon process.
β268Updated 3 years ago
Alternatives and similar repositories for unhook-bof:
Users that are interested in unhook-bof are comparing it to the libraries listed below
- Collection of beacon object files for use with Cobalt Strike to facilitate π.β174Updated 4 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object Fileβ192Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLLβ¦β167Updated 2 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or proβ¦β267Updated last year
- Beacon Object File (BOF) Creation Helperβ225Updated 2 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process injectβ¦β229Updated 2 years ago
- You shall passβ256Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locationsβ152Updated last year
- Useful Cobalt Strike BOFs found or used during engagementsβ138Updated last year
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.β215Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strikeβ174Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assemβ¦β187Updated 3 years ago
- COFF file (BOF) for managing Kerberos tickets.β291Updated last year
- BOF combination of KillDefender and Backstabβ165Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that bβ¦β238Updated 3 years ago
- A BOF to automate common persistence tasks for red teamersβ273Updated 2 years ago
- Collection of beacon BOF written to learn windows and cobaltstrikeβ346Updated 2 years ago
- A little tool to play with the Seclogon serviceβ308Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2β181Updated 2 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump inβ¦β261Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.β296Updated 2 years ago
- Building and Executing Position Independent Shellcode from Object Files in Memoryβ156Updated 4 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and eβ¦β273Updated 2 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.β137Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that bβ¦β216Updated 3 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)β277Updated 3 years ago
- Beacon Object File PoC implementation of KillDefenderβ218Updated 2 years ago
- Example code for using named pipe output with beacon ReflectiveDLLsβ113Updated 4 years ago
- Coerce Windows machines auth via MS-EVENβ157Updated last year
- C# version of Powermadβ160Updated last year