Skip to content
View boku7's full-sized avatar
🥷
-
🥷
-

Block or report boku7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
  • DarkWidow Public

    Forked from reveng007/DarkWidow

    Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc…

    C 8 2 MIT License Updated Feb 13, 2024
  • A Post-exploitation Toolset for Interacting with the Microsoft Graph API

    PowerShell 1 MIT License Updated Dec 5, 2023
  • ADOKit Public

    Forked from xforcered/ADOKit

    Azure DevOps Services Attack Toolkit

    C# 2 Apache License 2.0 Updated Dec 4, 2023
  • BokuLoader Public archive

    A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

    C 1,244 244 MIT License Updated Nov 22, 2023
  • DayBird Public

    Forked from xforcered/DayBird

    Extension functionality for the NightHawk operator client

    C# 1 Updated Oct 31, 2023
  • LOLBAS Public

    Forked from LOLBAS-Project/LOLBAS

    Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

    XSLT GNU General Public License v3.0 Updated Aug 5, 2023
  • Blog

    HTML 7 3 GNU General Public License v2.0 Updated Jul 18, 2023
  • BOFMask Public

    Forked from xforcered/BOFMask
    C 2 Updated Jun 28, 2023
  • LoudSunRun Public

    Forked from susMdT/LoudSunRun

    My shitty attempt at tampering with the callstack based on the work of namazso, SilentMoonWalk, and VulcanRaven

    C 6 Updated Jun 17, 2023
  • Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Mi…

    C 455 94 MIT License Updated May 16, 2023
  • Apollo Public

    Forked from MythicAgents/Apollo

    A .NET Framework 4.0 Windows Agent

    C# 3 BSD 3-Clause "New" or "Revised" License Updated Apr 21, 2023
  • whereami Public

    Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL's.

    C 160 28 MIT License Updated Mar 13, 2023
  • slae64 Public

    Repo for SLAE64 Exam

    Assembly 6 2 MIT License Updated Mar 8, 2023
  • GetSimple CMS My SMTP Contact Plugin <= v1.1.1 - CSRF to RCE

    Python 6 2 MIT License Updated Mar 8, 2023
  • Python 15 7 MIT License Updated Mar 8, 2023
  • GetSimple CMS Custom JS Plugin Exploit RCE Chain

    Python 11 4 MIT License Updated Mar 8, 2023
  • 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free

    Assembly 55 10 MIT License Updated Mar 8, 2023
  • x64 Assembly HalosGate direct System Caller to evade EDR UserLand hooks

    C 192 30 MIT License Updated Mar 8, 2023
  • Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process

    C 97 22 MIT License Updated Mar 8, 2023
  • Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes

    C 93 24 MIT License Updated Mar 8, 2023
  • Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.

    C 374 68 MIT License Updated Mar 8, 2023
  • 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.

    Assembly 127 38 MIT License Updated Mar 8, 2023
  • spawn Public

    Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (AC…

    C 427 69 MIT License Updated Mar 8, 2023
  • Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!

    C 431 87 MIT License Updated Mar 8, 2023
  • A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn

    C 100 27 MIT License Updated Mar 8, 2023
  • xPipe Public

    Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions

    C 75 23 MIT License Updated Mar 8, 2023
  • HOLLOW Public

    EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode

    C 263 57 MIT License Updated Mar 8, 2023
  • LPE exploit for CVE-2023-21768

    C 2 1 Updated Mar 8, 2023
  • StandIn Public

    Forked from FuzzySecurity/StandIn

    StandIn is a small .NET35/45 AD post-exploitation toolkit

    C# 1 Updated Feb 18, 2023
  • Havoc Public

    Forked from HavocFramework/Havoc

    The Havoc Framework

    Go GNU General Public License v3.0 Updated Oct 4, 2022