Skip to content
View boku7's full-sized avatar
🥷
-
🥷
-

Block or report boku7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
  • Reaping treasures from strings in remote processes memory

    C 230 18 MIT License Updated Feb 8, 2025
  • patchwerk Public

    BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)

    C 172 17 MIT License Updated Feb 6, 2025
  • DarkWidow Public

    Forked from reveng007/DarkWidow

    Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc…

    C 11 2 MIT License Updated Feb 13, 2024
  • A Post-exploitation Toolset for Interacting with the Microsoft Graph API

    PowerShell 2 MIT License Updated Dec 5, 2023
  • ADOKit Public

    Forked from xforcered/ADOKit

    Azure DevOps Services Attack Toolkit

    C# 3 Apache License 2.0 Updated Dec 4, 2023
  • BokuLoader Public

    A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

    C 1,298 251 MIT License Updated Nov 22, 2023
  • DayBird Public

    Forked from xforcered/DayBird

    Extension functionality for the NightHawk operator client

    C# 4 Updated Oct 31, 2023
  • LOLBAS Public

    Forked from LOLBAS-Project/LOLBAS

    Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

    XSLT GNU General Public License v3.0 Updated Aug 5, 2023
  • Blog

    HTML 9 3 GNU General Public License v2.0 Updated Jul 18, 2023
  • BOFMask Public

    Forked from xforcered/BOFMask
    C 2 Updated Jun 28, 2023
  • LoudSunRun Public

    Forked from susMdT/LoudSunRun

    My shitty attempt at tampering with the callstack based on the work of namazso, SilentMoonWalk, and VulcanRaven

    C 6 Updated Jun 17, 2023
  • Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Mi…

    C 478 97 MIT License Updated May 16, 2023
  • Apollo Public

    Forked from MythicAgents/Apollo

    A .NET Framework 4.0 Windows Agent

    C# 3 BSD 3-Clause "New" or "Revised" License Updated Apr 21, 2023
  • whereami Public

    Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL's.

    C 169 28 MIT License Updated Mar 13, 2023
  • slae64 Public

    Repo for SLAE64 Exam

    Assembly 9 2 MIT License Updated Mar 8, 2023
  • GetSimple CMS My SMTP Contact Plugin <= v1.1.1 - CSRF to RCE

    Python 9 2 MIT License Updated Mar 8, 2023
  • Python 15 7 MIT License Updated Mar 8, 2023
  • GetSimple CMS Custom JS Plugin Exploit RCE Chain

    Python 11 4 MIT License Updated Mar 8, 2023
  • 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free

    Assembly 60 10 MIT License Updated Mar 8, 2023
  • x64 Assembly HalosGate direct System Caller to evade EDR UserLand hooks

    C 203 30 MIT License Updated Mar 8, 2023
  • Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process

    C 100 22 MIT License Updated Mar 8, 2023
  • Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes

    C 103 24 MIT License Updated Mar 8, 2023
  • Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.

    C 379 68 MIT License Updated Mar 8, 2023
  • 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.

    Assembly 128 38 MIT License Updated Mar 8, 2023
  • spawn Public

    Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (AC…

    C 451 71 MIT License Updated Mar 8, 2023
  • Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!

    C 440 87 MIT License Updated Mar 8, 2023
  • A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn

    C 100 27 MIT License Updated Mar 8, 2023
  • xPipe Public

    Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions

    C 77 23 MIT License Updated Mar 8, 2023
  • HOLLOW Public

    EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode

    C 275 59 MIT License Updated Mar 8, 2023
  • LPE exploit for CVE-2023-21768

    C 2 1 Updated Mar 8, 2023