CS-Remote-OPs-BOF
Remote OS interaction toolkit
Provides tools and primitives for interacting with Microsoft Windows systems remotely.
886 stars
17 watching
138 forks
Language: C
last commit: 25 days ago Related projects:
Repository | Description | Stars |
---|---|---|
redmed-x/operatorskit | A collection of tools for interacting with and manipulating Windows systems, primarily designed for use in penetration testing and security research. | 551 |
ajpc500/bofs | A collection of tools and utilities to manipulate system calls, memory, and processes for exploitation and reverse engineering purposes. | 554 |
trustedsec/pplfaultdumpbof | Tools for analyzing PPLFault-related malware behavior on Windows 10 | 134 |
trustedsec/cs-situational-awareness-bof | Provides a set of basic situational awareness commands implemented in C. | 1,287 |
trustedsec/coffloader | Tools and utilities for loading, testing, and analyzing malicious COFF files | 482 |
robotis-git/open_manipulator_msgs | Provides ROS messages and tools for controlling and programming a robotic arm | 8 |
mr-un1k0d3r/elevate-system-trusted-bof | Tool to bypass Windows security restrictions and gain elevated privileges | 148 |
shenwei356/csvtk | A toolkit for reading and manipulating CSV and TSV files in a cross-platform way | 1,024 |
octoberfest7/kdstab | A tool used to bypass Windows Defender by manipulating process integrity and privileges | 156 |
mlcsec/asrenum-bof | Tools to detect and exploit vulnerabilities in Windows Attack Surface Reduction (ASR) settings | 142 |
robotis-git/open_manipulator | Controls a 4-DOF robotic arm with enhanced motion planning and teleoperation features | 357 |
trustedsec/artillery | A tool to protect operating systems from attacks | 330 |
ccob/bof.net | A .NET runtime framework for developing and executing malicious C code in a managed environment. | 682 |
netero1010/rdphijack-bof | A tool for hijacking remote RDP sessions using the WinStationConnect API | 297 |
netero1010/servicemove-bof | A tool that exploits a Windows vulnerability to execute arbitrary code on remote systems using a technique called DLL hijacking. | 284 |