BOFs

System call manipulator

A collection of tools and utilities to manipulate system calls, memory, and processes for exploitation and reverse engineering purposes.

Collection of Beacon Object Files

GitHub

554 stars
17 watching
112 forks
Language: C
last commit: about 2 years ago

Related projects:

Repository Description Stars
trustedsec/cs-remote-ops-bof Provides tools and primitives for interacting with Microsoft Windows systems remotely. 886
redmed-x/operatorskit A collection of tools for interacting with and manipulating Windows systems, primarily designed for use in penetration testing and security research. 551
dtmsecurity/bof_helper Creates C programs with custom API calls using Microsoft's documentation endpoint and grep results from mingw header files 222
rookuu/bofs A custom implementation of a low-level system function to facilitate reverse engineering and analysis of Windows systems 172
crypt0p3g/bof-collection A collection of beacon object files designed to be used in a remote access tool like Cobalt Strike. 170
netero1010/rdphijack-bof A tool for hijacking remote RDP sessions using the WinStationConnect API 297
hi5/csv A library of functions to work with comma-separated value files 59
outflanknl/inlinewhispers Tool to generate inline assembly code for direct system calls in COBalt Strike's Beacon Object Files (BOF) 308
robotis-git/open_manipulator_msgs Provides ROS messages and tools for controlling and programming a robotic arm 8
riccardoancarani/bofs Utilities for Cobalt Strike's Beacon Object Files to simplify working with shellcode and system processes 112
aatlasis/chiron A tool to assess and manipulate IPv6 security features by crafting arbitrary header chains 205
wjakob/filesystem A lightweight class for manipulating paths on Linux/Windows/Mac OS 245
alibaba/bytekit A Java bytecode manipulation framework designed for APM and diagnostic purposes 481
ccob/bof.net A .NET runtime framework for developing and executing malicious C code in a managed environment. 682
rsmudge/zerologon-bof An implementation of a Zero Logon protocol Bounce Of Flood (ZoBoF) vulnerability exploitation technique 157