Invoke-Bof
Payload loader
Loads and executes a malicious payload in a Windows system using PowerShell.
Load any Beacon Object File using Powershell!
245 stars
11 watching
34 forks
Language: PowerShell
last commit: almost 4 years ago cobalt-strikepowershell
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A Beacon Object File Visual Studio template project for creating malicious code executables | 145 |
| | Beacon object files for Cobalt Strike | 158 |
| | A PowerShell payload designed to evade detection and execute malicious commands on a target system | 108 |
| | A Cobalt Strike Beacon Object File (BOF) that uses custom syscaller code to make direct system calls to retrieve process information on the target system. | 95 |
| | A Cobalt Strike Beacon tool that spawns a sacrificial process to execute shellcode, using techniques like Arbitrary Code Guard and PPID spoofing to evade detection. | 440 |
| | Utilities for Cobalt Strike's Beacon Object Files to simplify working with shellcode and system processes | 112 |
| | A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| | Creates a custom C# beacon payload with AV bypass and shellcode injection capabilities | 20 |
| | Removes API hooks from a malicious process | 54 |
| | A collection of beacon object files designed to be used in a remote access tool like Cobalt Strike. | 170 |
| | Exploits a kernel vulnerability to gain SYSTEM privileges on Windows. | 29 |
| | A Cobalt Strike BOF that exploits a vulnerability to add an admin user | 70 |
| | Tools and techniques to bypass Windows UAC restrictions on executable files by utilizing DCOM objects | 119 |
| | Tool to bypass ETW (Event Tracing for Windows) security measure in remote processes by injecting a custom syscall | 276 |
| | A tool that bypasses AMSI in a remote process with code injection. | 377 |