Skip to content
View CDipper's full-sized avatar
🤒
Out sick
🤒
Out sick

Block or report CDipper

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
42 results for source starred repositories written in C
Clear filter

windows-kernel-exploits Windows平台提权漏洞集合

C 8,578 2,874 Updated Jun 11, 2021

Defeating Windows User Account Control

C 7,344 1,418 Updated Jan 11, 2026

Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.

C 3,221 825 Updated Sep 3, 2022

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

C 2,934 578 Updated Feb 24, 2025

generate CobaltStrike's cross-platform payload

C 2,539 373 Updated Nov 20, 2023

PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.

C 2,172 298 Updated Aug 15, 2024

Situational Awareness commands implemented using Beacon Object Files

C 1,708 277 Updated Jan 5, 2026

Fileless lateral movement tool that relies on ChangeServiceConfigA to run command

C 1,593 257 Updated Jul 10, 2023

A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!

C 1,397 269 Updated Nov 22, 2023

Cobalt Strike UDRL for memory scanner evasion.

C 1,001 177 Updated Jun 4, 2024

InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditiona…

C 737 138 Updated Jul 22, 2023

Execute unmanaged Windows executables in CobaltStrike Beacons

C 714 106 Updated Mar 4, 2023

A way to delete a locked file, or current running executable, on disk.

C 616 100 Updated Nov 5, 2025

Simulate the behavior of AV/EDR for malware development training.

C 562 50 Updated Feb 15, 2024

BOF to steal browser cookies & credentials

C 496 46 Updated Jan 22, 2026

An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.

C 490 68 Updated Dec 7, 2025

SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…

C 432 65 Updated Nov 3, 2025

A Visual Studio template used to create Cobalt Strike BOFs

C 323 55 Updated Nov 17, 2021

Research on Windows Kernel Executive Callback Objects

C 315 70 Updated Feb 22, 2020

Obex – Blocking unwanted DLLs in user mode

C 280 37 Updated Sep 18, 2025

Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.

C 258 50 Updated Mar 13, 2024

Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven

C 253 42 Updated Oct 16, 2024

Generic PE loader for fast prototyping evasion techniques

C 244 51 Updated Jul 2, 2024

A Beacon Object File (BOF) is a compiled C program, written to a convention that allows it to execute within a Beacon process and use internal Beacon APIs. BOFs are a way to rapidly extend the Beac…

C 243 26 Updated Nov 24, 2025

Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak

C 209 29 Updated Nov 12, 2025

Lateral movement with DCOM DLL hijacking

C 176 24 Updated Jul 4, 2025

A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass

C 165 20 Updated Sep 22, 2025
Next