CoffLoader
BOF handler
An implementation of in-house CoffLoader supporting CobaltStrike standard BOF and BSS initialized variables.
48 stars
2 watching
14 forks
Language: C
last commit: about 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A COFF file loader that executes COFF files and Cobalt Strike BOFs in-memory | 206 |
| Removes API hooks from a malicious process | 54 |
| A Cobalt Strike BOF that exploits a vulnerability to add an admin user | 70 |
| A collection of proof-of-concepts demonstrating lateral movement techniques using Windows and CobaltStrike | 342 |
| Exploits SeBackupPrivilege to dump remote system hives and credentials. | 159 |
| Converts Cobalt Strike BOF files to raw shellcode | 175 |
| Tools and utilities for loading, testing, and analyzing malicious COFF files | 483 |
| A Beacon Object File Visual Studio template project for creating malicious code executables | 145 |
| A Cobalt Strike Beacon Object File (BOF) that uses custom syscaller code to make direct system calls to retrieve process information on the target system. | 95 |
| A .NET runtime framework for developing and executing malicious C code in a managed environment. | 682 |
| A collection of compiled beacon object files from the CobaltStrike platform. | 101 |
| Utilities for Cobalt Strike's Beacon Object Files to simplify working with shellcode and system processes | 112 |
| Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| A Cobalt Strike Beacon tool that spawns a sacrificial process to execute shellcode, using techniques like Arbitrary Code Guard and PPID spoofing to evade detection. | 440 |
| A CobaltStrike payload that uses DLL hijacking to spawn additional Beacons on Windows systems | 219 |