Skip to content
View sudonoodle's full-sized avatar

Sponsoring

@RedByte1337

Block or report sudonoodle

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
35 stars written in C
Clear filter

A memory-based evasion technique which makes shellcode invisible from process start to end.

C 1,195 143 Updated Oct 16, 2023

A BOF that runs unmanaged PEs inline

C 658 80 Updated Oct 23, 2024

Collection of Beacon Object Files (BOF) for Cobalt Strike

C 650 93 Updated Aug 15, 2025

The Definitive Guide To Process Cloning on Windows

C 523 47 Updated Jan 3, 2024

A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk

C 465 64 Updated Jul 6, 2024

Encrypted shellcode Injection to avoid Kernel triggered memory scans

C 394 41 Updated Sep 12, 2023

AdaptixFramework Extension Kit

C 292 86 Updated Oct 29, 2025

A BOF to automate common persistence tasks for red teamers

C 290 44 Updated Mar 7, 2023

Reaping treasures from strings in remote processes memory

C 272 21 Updated Feb 8, 2025

Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts.

C 251 48 Updated Mar 13, 2024

Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.

C 248 27 Updated Jun 11, 2024

Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread

C 246 21 Updated Aug 31, 2025

Take a screenshot without injection for Cobalt Strike

C 201 12 Updated Jun 7, 2023

An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution

C 193 29 Updated Nov 27, 2024

A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike

C 169 25 Updated Oct 29, 2025

The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencies.

C 162 20 Updated Sep 3, 2025

Local SYSTEM auth trigger for relaying - X

C 150 16 Updated Jul 23, 2025

Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options

C 143 12 Updated Mar 26, 2025

Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll

C 131 15 Updated Apr 18, 2025

AzureAD beacon object files

C 130 13 Updated Dec 18, 2024

A BOF to enumerate system process, their protection levels, and more.

C 122 9 Updated Nov 27, 2024

Boilerplate to develop raw and truly Position Independent Code (PIC).

C 106 16 Updated Jan 20, 2025

An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.

C 102 19 Updated Oct 6, 2025

Updated version of a long known self deletion technique to work with 24H2.

C 61 3 Updated Jun 9, 2025

PrimitiveInjection by using Read, Write and Allocation Primitives.

C 49 4 Updated Jun 21, 2025

Enable EFS service as low priv user (PE & BOF)

C 21 2 Updated Jul 6, 2025
Next