spawn
Process spawner
A Cobalt Strike Beacon tool that spawns a sacrificial process to execute shellcode, using techniques like Arbitrary Code Guard and PPID spoofing to evade detection.
Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing.
440 stars
13 watching
70 forks
Language: C
last commit: almost 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A Cobalt Strike Beacon Object File (BOF) that uses custom syscaller code to make direct system calls to retrieve process information on the target system. | 95 |
| Removes API hooks from a malicious process | 54 |
| A tool that enables remote process shellcode execution using the Early Bird injection technique | 267 |
| Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| A Beacon Object File Visual Studio template project for creating malicious code executables | 145 |
| A tool that bypasses AMSI in a remote process with code injection. | 377 |
| Tool to bypass ETW (Event Tracing for Windows) security measure in remote processes by injecting a custom syscall | 276 |
| Utilities for Cobalt Strike's Beacon Object Files to simplify working with shellcode and system processes | 112 |
| An exploit tool that uses direct system calls to enumerate processes based on specific loaded modules or process handles | 266 |
| A Cobalt Strike beacon implementation in Rust for creating malicious network connections | 180 |
| A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| A tool to simulate a Cobalt Strike beacon connection packet by parsing the payload and extracting RSA public key | 78 |
| An aggressor script that allows Cobalt Strike to perform process injection and persistence by leveraging direct syscalls to bypass EDR/AV systems. | 229 |
| Beacon object files for Cobalt Strike | 158 |
| A proof-of-concept technique for dynamically spoofing an application's call stack using timers. | 256 |