yinsel / CVE-2024-35250-BOFLinks
CVE-2024-35250 的 Beacon Object File (BOF) 实现。
☆21Updated 10 months ago
Alternatives and similar repositories for CVE-2024-35250-BOF
Users that are interested in CVE-2024-35250-BOF are comparing it to the libraries listed below
Sorting:
- Help red teams find opsec processes during engagements☆43Updated 10 months ago
- Silently Install Chrome Extension For Persistence☆92Updated last year
- ☆43Updated 2 years ago
- A BOF/COFF loader implemented in Go and CGO.☆22Updated last year
- 一个普通的BOF用来BypassUAC☆22Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆178Updated 2 months ago
- ☆31Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆57Updated 2 years ago
- Self Cleanup in post-ex job☆58Updated last year
- More EFS coerced authentication method with PetitPotam.py☆26Updated 2 years ago
- CVE-2023-21707 EXP☆28Updated 2 years ago
- Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.☆43Updated 3 weeks ago
- A Custom CLR Assembly for MSSQL of the popular tool GodPotato☆80Updated 2 years ago
- A BOF to create a scheduled task using a COM object.☆13Updated 10 months ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆53Updated 2 years ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆26Updated last year
- A Simple PoC☆21Updated last year
- AddDefenderExclusions Beacon Object File☆40Updated 2 years ago
- Kill Everything AV/EDR☆27Updated 11 months ago
- 在cobaltstrike中使用的bof工具集,收集整理验证好用的bof。☆15Updated 4 years ago
- ☆25Updated 6 months ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆52Updated last year
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Updated 2 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆35Updated 3 months ago
- Evasive loader to bypass static detection☆59Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆57Updated 2 weeks ago
- ASPX ShellCode Loader☆52Updated last year
- command execute without 445 port☆52Updated 3 years ago
- ☆22Updated last year
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago