BOFs
System call manipulator
A collection of tools and utilities to manipulate system calls, memory, and processes for exploitation and reverse engineering purposes.
Collection of Beacon Object Files
554 stars
17 watching
112 forks
Language: C
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Provides tools and primitives for interacting with Microsoft Windows systems remotely. | 892 |
| A collection of tools for interacting with and manipulating Windows systems, primarily designed for use in penetration testing and security research. | 551 |
| Creates C programs with custom API calls using Microsoft's documentation endpoint and grep results from mingw header files | 222 |
| A custom implementation of a low-level system function to facilitate reverse engineering and analysis of Windows systems | 172 |
| A collection of beacon object files designed to be used in a remote access tool like Cobalt Strike. | 170 |
| A tool for hijacking remote RDP sessions using the WinStationConnect API | 297 |
| A library of functions to work with comma-separated value files | 59 |
| Tool to generate inline assembly code for direct system calls in COBalt Strike's Beacon Object Files (BOF) | 308 |
| Provides ROS messages and tools for controlling and programming a robotic arm | 8 |
| Utilities for Cobalt Strike's Beacon Object Files to simplify working with shellcode and system processes | 112 |
| A tool to assess and manipulate IPv6 security features by crafting arbitrary header chains | 205 |
| A lightweight class for manipulating paths on Linux/Windows/Mac OS | 245 |
| A Java bytecode manipulation framework designed for APM and diagnostic purposes | 481 |
| A .NET runtime framework for developing and executing malicious C code in a managed environment. | 682 |
| An implementation of a Zero Logon protocol Bounce Of Flood (ZoBoF) vulnerability exploitation technique | 157 |