BOFs
System call manipulator
A collection of tools and utilities to manipulate system calls, memory, and processes for exploitation and reverse engineering purposes.
Collection of Beacon Object Files
554 stars
17 watching
112 forks
Language: C
last commit: about 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
trustedsec/cs-remote-ops-bof | Provides tools and primitives for interacting with Microsoft Windows systems remotely. | 886 |
redmed-x/operatorskit | A collection of tools for interacting with and manipulating Windows systems, primarily designed for use in penetration testing and security research. | 551 |
dtmsecurity/bof_helper | Creates C programs with custom API calls using Microsoft's documentation endpoint and grep results from mingw header files | 222 |
rookuu/bofs | A custom implementation of a low-level system function to facilitate reverse engineering and analysis of Windows systems | 172 |
crypt0p3g/bof-collection | A collection of beacon object files designed to be used in a remote access tool like Cobalt Strike. | 170 |
netero1010/rdphijack-bof | A tool for hijacking remote RDP sessions using the WinStationConnect API | 297 |
hi5/csv | A library of functions to work with comma-separated value files | 59 |
outflanknl/inlinewhispers | Tool to generate inline assembly code for direct system calls in COBalt Strike's Beacon Object Files (BOF) | 308 |
robotis-git/open_manipulator_msgs | Provides ROS messages and tools for controlling and programming a robotic arm | 8 |
riccardoancarani/bofs | Utilities for Cobalt Strike's Beacon Object Files to simplify working with shellcode and system processes | 112 |
aatlasis/chiron | A tool to assess and manipulate IPv6 security features by crafting arbitrary header chains | 205 |
wjakob/filesystem | A lightweight class for manipulating paths on Linux/Windows/Mac OS | 245 |
alibaba/bytekit | A Java bytecode manipulation framework designed for APM and diagnostic purposes | 481 |
ccob/bof.net | A .NET runtime framework for developing and executing malicious C code in a managed environment. | 682 |
rsmudge/zerologon-bof | An implementation of a Zero Logon protocol Bounce Of Flood (ZoBoF) vulnerability exploitation technique | 157 |