Inline-Execute-PE
Beacon runner
An inline execution suite for CobaltStrike Beacons to load and run unmanaged Windows executables.
Execute unmanaged Windows executables in CobaltStrike Beacons
648 stars
17 watching
102 forks
Language: C
last commit: almost 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of compiled beacon object files from the CobaltStrike platform. | 101 |
| A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| A toolset to extract and analyze configurations from malware samples known as Cobalt Strike Beacons. | 148 |
| Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| A Cobalt Strike beacon implementation in Rust for creating malicious network connections | 180 |
| Tool to generate inline assembly code for direct system calls in COBalt Strike's Beacon Object Files (BOF) | 308 |
| Deciphers CobaltStrike Beacon configurations from various formats. | 1,028 |
| An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 |
| Tool to compile and build Beacon Object Files (BOF) from a directory of files | 26 |
| A minimal test runner for ECMAScript Modules, designed to support concurrent asynchronous testing with native module support. | 45 |
| A Cobalt Strike Beacon tool that spawns a sacrificial process to execute shellcode, using techniques like Arbitrary Code Guard and PPID spoofing to evade detection. | 440 |
| An experimental library that allows you to run tasks in parallel on multiple processes while maintaining control over the execution of code in both parent and child processes. | 586 |
| Periodically runs external commands and exposes their output as an HTTP endpoint with live updates | 33 |
| A tool for detecting and parsing CobaltStrike beacon configuration from files or process memory. | 902 |
| Historical metadata of Cobalt Strike Beacon attacks | 125 |