wotwot563 / aad_prt_bofView external linksLinks
☆157Apr 17, 2024Updated last year
Alternatives and similar repositories for aad_prt_bof
Users that are interested in aad_prt_bof are comparing it to the libraries listed below
Sorting:
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆540Nov 23, 2025Updated 2 months ago
- ☆156Dec 14, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆432Dec 21, 2023Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆278Nov 4, 2022Updated 3 years ago
- Cobalt Strike BOF for evasive .NET assembly execution☆307Mar 31, 2025Updated 10 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆122Jan 17, 2026Updated 3 weeks ago
- COFF file (BOF) for managing Kerberos tickets.☆321Jul 2, 2023Updated 2 years ago
- ☆1,117Jan 6, 2026Updated last month
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Mar 1, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆387Feb 23, 2024Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆359Jan 29, 2026Updated 2 weeks ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆126Sep 1, 2024Updated last year
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 2 years ago
- Tools for interacting with authentication packages using their individual message protocols☆368Feb 1, 2026Updated 2 weeks ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆670Aug 15, 2025Updated 6 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆886Updated this week
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Aug 23, 2025Updated 5 months ago
- Lockless BOF☆79May 2, 2025Updated 9 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- ForsHops☆152Mar 25, 2025Updated 10 months ago
- MS-FSRVP coercion abuse PoC☆305Dec 30, 2021Updated 4 years ago
- ☆131Dec 4, 2023Updated 2 years ago
- BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released a…☆394Jan 9, 2024Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,366Oct 27, 2023Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆90Oct 13, 2024Updated last year
- ☆137Nov 17, 2025Updated 2 months ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆155Nov 2, 2025Updated 3 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆385Feb 9, 2026Updated last week
- Abusing Azure services over C2☆368Jan 20, 2026Updated 3 weeks ago
- ☆216Mar 26, 2024Updated last year
- A BOF that runs unmanaged PEs inline☆678Oct 23, 2024Updated last year
- ☆51Jun 28, 2025Updated 7 months ago
- ☆235Oct 8, 2024Updated last year
- A BOF to enumerate system process, their protection levels, and more.☆124Nov 27, 2024Updated last year