trustedsec / PPLFaultDumpBOFLinks
☆142Updated 2 years ago
Alternatives and similar repositories for PPLFaultDumpBOF
Users that are interested in PPLFaultDumpBOF are comparing it to the libraries listed below
Sorting:
- ☆158Updated 2 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆140Updated 4 years ago
- A simple BOF that frees UDRLs☆120Updated 3 years ago
- ☆81Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆80Updated 10 months ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆156Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- In-memory token vault BOF for Cobalt Strike☆145Updated 3 years ago
- ☆127Updated 2 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆184Updated 3 years ago
- Library of BOFs to interact with SQL servers☆198Updated this week
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆206Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆101Updated last year
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆147Updated 3 years ago
- ☆88Updated 2 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆136Updated 2 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆81Updated 3 years ago
- ☆122Updated 2 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Updated 2 years ago
- Coerce Windows machines auth via MS-EVEN☆165Updated last year
- BOF combination of KillDefender and Backstab☆170Updated 2 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆131Updated 3 years ago
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- A C# port from Invoke-GhostTask☆118Updated last year
- POC tools for exploring SMB over QUIC protocol☆128Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆81Updated 2 years ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- POC tool to convert CobaltStrike BOF files to raw shellcode☆208Updated 3 years ago