add some CS tools about use BOF tech

This commit is contained in:
Mrxn
2022-01-19 23:36:05 +08:00
parent aa53a87640
commit 45e466ca88
+17
View File
@@ -952,6 +952,23 @@
- [pwncat:功能强大的反向Shell&BindShell处理工具](https://github.com/calebstewart/pwncat)
- [ReverseRDP_RCE:反向 RCE 连接 RDP 的客户端](https://github.com/klinix5/ReverseRDP_RCE)
- [Urldns:通过 Urldns 链来探测是否存在某个类,以便针对性的使用攻击链](https://github.com/kezibei/Urldns)
- [COFFLoader2Load and execute COFF files and Cobalt Strike BOFs in-memory](https://github.com/Yaxser/COFFLoader2)
- [Cobalt-ClipCobaltstrike addons to interact with clipboard](https://github.com/DallasFR/Cobalt-Clip)
- [Invoke-BofLoad any Beacon Object File using Powershell](https://github.com/airbus-cert/Invoke-Bof)
- [InlineWhispers2Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2](https://github.com/Sh0ckFR/InlineWhispers2)
- [GeaconUsing Go to implement CobaltStrike's Beacon](https://github.com/DongHuangT1/Geacon)
- [DLL-Hijack-Search-Order-BOFDLL Hijack Search Order Enumeration BOF](https://github.com/EspressoCake/DLL-Hijack-Search-Order-BOF)
- [PortBenderTCP Port Redirection Utility](https://github.com/praetorian-inc/PortBender)
- [winrmdllC++ WinRM API via Reflective DLL](https://github.com/mez-0/winrmdll)
- [Readfile_BoFread file contents to beacon output](https://github.com/trainr3kt/Readfile_BoF)
- [BokuLoaderCobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities](https://github.com/boku7/BokuLoader)
- [HOLLOWEarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode](https://github.com/boku7/HOLLOW)
- [MemReader_BoFsearch and extract specific strings from a target process memory and return what is found to the beacon output](https://github.com/trainr3kt/MemReader_BoF)
- [secinjectSection Mapping Process Injection (secinject): Cobalt Strike BOF](https://github.com/apokryptein/secinject)
- [BOF-BuilderC# .Net 5.0 project to build BOF (Beacon Object Files) in mass](https://github.com/ceramicskate0/BOF-Builder)
- [ServiceMove-BOFNew lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution](https://github.com/netero1010/ServiceMove-BOF)
- [TrustedPath-UACBypass-BOFBeacon object file implementation for trusted path UAC bypass](https://github.com/netero1010/TrustedPath-UACBypass-BOF)
- [Quser-BOFCobalt Strike BOF for quser.exe implementation using Windows API](https://github.com/netero1010/Quser-BOF)
## <span id="head8"> 文章/书籍/教程相关</span>