Example code for using named pipe output with beacon ReflectiveDLLs
β121Jun 24, 2020Updated 5 years ago
Alternatives and similar repositories for cs-rdll-ipc-example
Users that are interested in cs-rdll-ipc-example are comparing it to the libraries listed below
Sorting:
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloadsβ101Sep 30, 2020Updated 5 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate π.β185Feb 11, 2021Updated 5 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.β152Sep 3, 2020Updated 5 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or proβ¦β275May 3, 2023Updated 2 years ago
- Cobalt Strike Beacon Object Filesβ167May 2, 2022Updated 3 years ago
- Managed assembly shellcode generationβ280Mar 19, 2021Updated 4 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strikeβ271Jun 13, 2020Updated 5 years ago
- Reflective DLL loading of your favorite Golang programβ173Jan 27, 2020Updated 6 years ago
- β101Aug 23, 2021Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.β220May 3, 2023Updated 2 years ago
- Beacon Object File (BOF) for remote process injection via thread hijackingβ220Jan 13, 2021Updated 5 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object Fileβ216Oct 8, 2020Updated 5 years ago
- Collection of beacon BOF written to learn windows and cobaltstrikeβ362Feb 24, 2023Updated 3 years ago
- PoC to demonstrate how CLR ETW events can be tampered.β192Mar 26, 2020Updated 5 years ago
- Remove API hooks from a Beacon process.β282Sep 18, 2021Updated 4 years ago
- β181Feb 3, 2021Updated 5 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.β61Jul 10, 2024Updated last year
- Collection of CobaltStrike beacon object filesβ105Feb 14, 2022Updated 4 years ago
- My CobaltStrike BOFSβ167Jul 23, 2022Updated 3 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS headβ¦β595Jul 26, 2021Updated 4 years ago
- Run shellcode from resourceβ259Dec 13, 2020Updated 5 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"β178Nov 26, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagementsβ146Jun 29, 2021Updated 4 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)β321Nov 9, 2021Updated 4 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.β33Oct 1, 2021Updated 4 years ago
- β163Apr 25, 2022Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.β141Sep 29, 2021Updated 4 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2β186Jul 21, 2022Updated 3 years ago
- A C# tool to search through a running instance of Outlook for keywordsβ111Jan 14, 2021Updated 5 years ago
- Evading WinDefender ATP credential-theftβ255Dec 2, 2019Updated 6 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++β109Jan 3, 2021Updated 5 years ago
- Collection of Beacon Object Files (BOFs) for shells and lolsβ121Sep 14, 2021Updated 4 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.β109Oct 10, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.β143Sep 24, 2021Updated 4 years ago
- Beacon Object File (BOF) Creation Helperβ236May 3, 2022Updated 3 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFsβ125May 24, 2022Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)β21Aug 29, 2021Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().β219Mar 5, 2020Updated 5 years ago
- β71Sep 17, 2020Updated 5 years ago