securifybv / BOFRyptor
☆120Updated last year
Alternatives and similar repositories for BOFRyptor:
Users that are interested in BOFRyptor are comparing it to the libraries listed below
- ☆123Updated 6 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆83Updated 2 years ago
- Lateral Movement via the .NET Profiler☆80Updated 4 months ago
- ☆116Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- Do some DLL SideLoading magic☆79Updated last year
- TypeLib persistence technique☆108Updated 4 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆87Updated 9 months ago
- ☆94Updated 6 months ago
- ☆108Updated 4 months ago
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- ☆103Updated last month
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- ApexLdr is a DLL Payload Loader written in C☆109Updated 8 months ago
- AzureAD beacon object files☆117Updated 3 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆106Updated last year
- ☆154Updated last year
- Simple BOF to read the protection level of a process☆114Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆59Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆118Updated 5 months ago
- ☆96Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- C# havoc implant☆100Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year