8000 Octoberfest7 / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View Octoberfest7's full-sized avatar

Block or report Octoberfest7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases…

C++ 288 41 Updated Mar 6, 2025

BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions

C++ 300 37 Updated Nov 19, 2024

BOF for Kerberos abuse (an implementation of some important features of the Rubeus).

C 464 51 Updated Mar 29, 2025

A set of fully-undetectable process injection techniques abusing Windows Thread Pools

C++ 1,099 143 Updated Dec 11, 2023

A BOF that runs unmanaged PEs inline

C 602 71 Updated Oct 23, 2024

Encrypted shellcode Injection to avoid Kernel triggered memory scans

C 8000 372 41 Updated Sep 12, 2023

Hardcore Debugging

876 110 Updated Apr 24, 2025

Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type

206 33 Updated Mar 18, 2024

HVNC for Cobalt Strike

C 1,218 185 Updated Dec 7, 2023

Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (AC…

C 459 71 Updated Mar 8, 2023

HTML smuggling is not an evil, it can be useful

HTML 386 46 Updated Feb 19, 2024

The Definitive Guide To Process Cloning on Windows

C 482 43 Updated Jan 3, 2024

Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.

C++ 806 130 Updated Jul 2, 2024

Dump the memory of any PPL with a Userland exploit chain

C++ 333 36 Updated Mar 17, 2023
C# 221 20 Updated Oct 22, 2023

Windows System Programming Experiments

C++ 218 38 Updated Jun 13, 2022

A Visual Studio template used to create Cobalt Strike BOFs

C 304 55 Updated Nov 17, 2021

A DLL loader with advanced evasive features

C 717 91 Updated Feb 26, 2023

BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released at BSides Cymru 2023.

C 380 54 Updated Jan 9, 2024

DLL Exports Extraction BOF with optional NTFS transactions.

C 82 13 Updated Nov 5, 2021

Exploiting DLL Hijacking by DLL Proxying Super Easily

C 506 105 Updated Jul 9, 2023

Random Tools

PowerShell 839 215 Updated Oct 20, 2022

Payload Loader With Evasion Features

C 317 54 Updated Jan 22, 2023

Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)

C# 789 160 Updated Feb 9, 2022
C# 572 58 Updated May 1, 2025

A cross-platform C and C++ unit testing framework for the 21st century

C 2,117 184 Updated Apr 13, 2025

Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations

C++ 154 16 Updated Mar 1, 2024

Win32 Console Documentation -- in particular, console/standard handles and CreateProcess inheritance

C++ 112 16 Updated Apr 27, 2024

A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.html#dirty-vanity-a-new-approach-to-code-injection--edr-bypass…

C 636 87 Updated Dec 23, 2022
Next
0