unhook-bof
Process hook remover
Removes API hooks from a malicious process
Remove API hooks from a Beacon process.
54 stars
1 watching
16 forks
Language: C
last commit: almost 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Tool to remove API hooks from a Beacon process. | 263 |
| A Cobalt Strike Beacon tool that spawns a sacrificial process to execute shellcode, using techniques like Arbitrary Code Guard and PPID spoofing to evade detection. | 440 |
| A Cobalt Strike Beacon Object File (BOF) that uses custom syscaller code to make direct system calls to retrieve process information on the target system. | 95 |
| Beacon object files for Cobalt Strike | 158 |
| A Beacon Object File Visual Studio template project for creating malicious code executables | 145 |
| Utilities for Cobalt Strike's Beacon Object Files to simplify working with shellcode and system processes | 112 |
| A proof-of-concept project demonstrating how to mask Beacon's payload execution in Cobalt Strike while executing a user-provided BOF. | 110 |
| A Cobalt Strike BOF that exploits a vulnerability to add an admin user | 70 |
| A collection of Cobalt Strike Beacon Objectives (BOFs) that perform various tasks such as domain information retrieval, clipboard data extraction, WiFi enumeration, port scanning, and registry persistence. | 593 |
| A Cobalt Strike beacon implementation in Rust for creating malicious network connections | 180 |
| Tool to hunt and mine Cobalt Strike beacons from internet-connected services | 164 |
| Detects and analyzes Cobalt Strike beacons by analyzing HTTP responses and extracting configuration information. | 266 |
| A collection of beacon object files designed to be used in a remote access tool like Cobalt Strike. | 170 |
| Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| An implementation of in-house CoffLoader supporting CobaltStrike standard BOF and BSS initialized variables. | 48 |