thomasxm / BOAZLinks
A Multilayered AV/EDR Evasion Framework and AV Testing Tool.
☆18Updated 7 months ago
Alternatives and similar repositories for BOAZ
Users that are interested in BOAZ are comparing it to the libraries listed below
Sorting:
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆107Updated 2 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆91Updated 9 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Updated 9 months ago
- An interactive shell to spoof some LOLBins command line☆188Updated 2 years ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆91Updated 9 months ago
- Automated .NET AppDomain hijack payload generation☆129Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 11 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150Updated last year
- .bin file to shellcode convertor☆39Updated last year
- ☆85Updated 8 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61Updated last year
- Generate an Alphabetical Polymorphic Shellcode☆135Updated 5 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆94Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆153Updated 6 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆61Updated 11 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- Command and Control (C2) framework☆132Updated 8 months ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆233Updated this week
- A collection of Cobalt Strike Aggressor scripts.☆110Updated 4 years ago
- Convert your shellcode into an ASCII string☆127Updated 7 months ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- A C2 framework built for my bachelors thesis☆57Updated 3 weeks ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138Updated 8 months ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Updated last year