trustedsec / PPLFaultDumpBOFLinks
☆142Updated 2 years ago
Alternatives and similar repositories for PPLFaultDumpBOF
Users that are interested in PPLFaultDumpBOF are comparing it to the libraries listed below
Sorting:
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆142Updated 4 years ago
- A simple BOF that frees UDRLs☆121Updated 3 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆84Updated last year
- ☆81Updated last year
- ☆159Updated 2 years ago
- ☆128Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Updated last year
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆185Updated 4 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆102Updated last year
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆136Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆84Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆80Updated 3 years ago
- In-memory token vault BOF for Cobalt Strike☆145Updated 3 years ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆85Updated 2 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆150Updated 3 years ago
- ☆123Updated 2 years ago
- Library of BOFs to interact with SQL servers☆206Updated this week
- ☆92Updated 2 years ago
- BOF combination of KillDefender and Backstab☆170Updated 2 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- Coerce Windows machines auth via MS-EVEN☆168Updated last year
- ErebusGate for Nim Bypass AV/EDR☆164Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- Execute commands in other Sessions☆89Updated last year
- ☆71Updated 3 years ago
- A C# port from Invoke-GhostTask☆117Updated last year
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆41Updated last year
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆126Updated 3 years ago