BOF-Nim
Nim BOF Tool
A tool that creates and executes Cobalt Strike Base of operations (BOF) files using the Nim programming language
Cobalt Strike BOF Files with Nim!
84 stars
7 watching
13 forks
Language: Nim
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
0x3rhy/adduser-bof | A Cobalt Strike BOF that exploits a vulnerability to add an admin user | 69 |
rvrsh3ll/bof_collection | A collection of Cobalt Strike Beacon Objectives (BOFs) that perform various tasks such as domain information retrieval, clipboard data extraction, WiFi enumeration, port scanning, and registry persistence. | 581 |
wumb0/rust_bof | A proof-of-concept project demonstrating how to create and compile Cobalt Strike Beacon Object Files in Rust | 253 |
cobalt-strike/bof-vs | A Beacon Object File Visual Studio template project for creating malicious code executables | 138 |
guervild/bofs | Beacon object files for Cobalt Strike | 159 |
crypt0p3g/bof-collection | A collection of beacon object files designed to be used in a remote access tool like Cobalt Strike. | 170 |
falconforceteam/bof2shellcode | Converts Cobalt Strike BOF files to raw shellcode | 173 |
boku7/halosgate-ps | A Cobalt Strike Beacon Object File (BOF) that uses custom syscaller code to make direct system calls to retrieve process information on the target system. | 94 |
ccob/bof.net | A .NET runtime framework for developing and executing malicious C code in a managed environment. | 678 |
riccardoancarani/bofs | Utilities for Cobalt Strike's Beacon Object Files to simplify working with shellcode and system processes | 111 |
codextf2/screenshotbof | A screenshot tool for Cobalt Strike that bypasses the fork-and-run technique for increased OPSEC safety | 346 |
mlcsec/asrenum-bof | Tools to detect and exploit vulnerabilities in Windows Attack Surface Reduction (ASR) settings | 138 |
ceramicskate0/bof-builder | Tool to compile and build Beacon Object Files (BOF) from a directory of files | 26 |
tomcarver16/bof-dll-inject | A tool for injecting malware into processes by mapping it to memory without registering it with the kernel. | 147 |
netero1010/quser-bof | A proof-of-concept implementation of a Windows API-based backdoor using the quser.exe utility | 83 |