Inline-Execute-PE
Beacon runner
An inline execution suite for CobaltStrike Beacons to load and run unmanaged Windows executables.
Execute unmanaged Windows executables in CobaltStrike Beacons
648 stars
17 watching
102 forks
Language: C
last commit: over 2 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A collection of compiled beacon object files from the CobaltStrike platform. | 101 |
| | A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |
| | A toolset to extract and analyze configurations from malware samples known as Cobalt Strike Beacons. | 148 |
| | Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| | A Cobalt Strike beacon implementation in Rust for creating malicious network connections | 180 |
| | Tool to generate inline assembly code for direct system calls in COBalt Strike's Beacon Object Files (BOF) | 308 |
| | Deciphers CobaltStrike Beacon configurations from various formats. | 1,028 |
| | An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 |
| | Tool to compile and build Beacon Object Files (BOF) from a directory of files | 26 |
| | A minimal test runner for ECMAScript Modules, designed to support concurrent asynchronous testing with native module support. | 45 |
| | A Cobalt Strike Beacon tool that spawns a sacrificial process to execute shellcode, using techniques like Arbitrary Code Guard and PPID spoofing to evade detection. | 440 |
| | An experimental library that allows you to run tasks in parallel on multiple processes while maintaining control over the execution of code in both parent and child processes. | 586 |
| | Periodically runs external commands and exposes their output as an HTTP endpoint with live updates | 33 |
| | A tool for detecting and parsing CobaltStrike beacon configuration from files or process memory. | 902 |
| | Historical metadata of Cobalt Strike Beacon attacks | 125 |