awesome-bof

Reference: Public BOF Repositories Catalog

This catalog organizes public Beacon Object File (BOF) repositories into four key categories: Toolkit Collections, Lists of BOFs, Smaller BOF Packs, and Other BOFs. Use this as a quick reference to find curated toolkits, comprehensive lists, bite‑sized BOF bundles, or explore the broader ecosystem.

🧰 BOF Collections

These repositories contain a variety of BOFs covering multiple functions, often organized as a suite or kit.

Project Description Stars Last commit
CS-Situational-Awareness-BOF Network and host enumeration commands (ipconfig, arp, netstat) as BOFs for stealthy reconnaissance
C2-Tool-Collection Outflank’s red team toolkits including multiple BOFs for various operations
CS-Remote-OPs-BOF Remote ops BOFs for files, tokens, impersonation and lateral movement
OperatorsKit This repository contains a collection of Beacon Object Files (BOFs) that integrate with Cobalt Strike.
BOFs Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.
LDAP-Bof-Collection Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.
PostEx-Arsenal Arsenal of post-exploitation BOF modules including BrowserDump, Clipdump, LateralMov, Screenshot, Slackdump, and more
BusyBOF Busybox-style BOFs for *nix post-exploitation — reimplements Unix utilities for stripped environments (Docker, K8s, minimal VMs)

Click to view commands from trustedsec/CS-Situational-Awareness-BOF These are commands available in the `TrustedSec/CS-Situational-Awareness-BOF` repo as per 2026-01-26. Note that you cannot click them from this repo, you have to visit the repo itself to view each BOF in detail. *Content manually copied from the TrustedSec repository. Please refer to the original for the most up-to-date information.* ## Available commands |Commands|Usage|Notes| |--------|-----|-----| |adcs_enum | adcs_enum| Enumerate CAs and templates in the AD using Win32 functions| |adcs_enum_com | adcs_enum_com| Enumerate CAs and templates in the AD using ICertConfig COM object| |adcs_enum_com2 | adcs_enum_com2| Enumerate CAs and templates in the AD using IX509PolicyServerListManager COM object| |adv_audit_policies | adv_audit_policies| Retrieve advanced security audit policies| |arp | arp| List ARP table| |cacls|cacls [filepath]| List user permissions for the specified file, wildcards supported| |dir| dir [directory] [/s]| List files in a directory. Supports wildcards (e.g. "C:\Windows\S*") unlike the CobaltStrike `ls` command| |driversigs| driversigs| Enumerate installed services Imagepaths to check the signing cert against known AV/EDR vendors| |enum_filter_driver| enum_filter_driver [opt:computer]| Enumerate filter drivers| |enumLocalSessions| enumLocalSessions| Enumerate currently attached user sessions both local and over RDP| |env| env| List process environment variables| |findLoadedModule| findLoadedModule [modulepart] [opt:procnamepart]| Find what processes \*modulepart\* are loaded into, optionally searching just \*procnamepart\*| |get_dpapi_system| get_dpapi_system | Get the DPAPI_SYSTEM key and bootkey | |get_password_policy| get_password_policy [hostname]| Get target server or domain's configured password policy and lockouts| |get_session_info| get_session_info | prints out information related to the current users logon session | |ipconfig| ipconfig| List IPv4 address, hostname, and DNS server| |ldapsearch| ldapsearch [--attributes] [--count] [--scope] [--hostname] [--dn] [--ldaps] | Execute LDAP searches (NOTE: specify *,ntsecuritydescriptor as attribute parameter if you want all attributes + base64 encoded ACL of the objects, this can then be resolved using BOFHound. Could possibly break pagination, although everything seemed fine during testing.)| |ldapsecuritycheck| ldapsecuritycheck [opt:dc]| Check LDAP signing and LDAPS channel binding requirements on domain controllers. Performs authentication tests to detect security configurations.| |listdns| listdns| List DNS cache entries. Attempt to query and resolve each| |list_firewall_rules| list_firewall_rules| List Windows firewall rules| |listmods| listmods [opt: pid]| List process modules (DLL). Target current process if PID is empty. Complement to driversigs to determine if our process was injected by AV/EDR| |listpipes| listpipes| List named pipes| |locale| locale| List system locale language, locale ID, date, time, and country| |netGroupList| netGroupList [opt: domain]| List groups from the default or specified domain| |netGroupListMembers| netGroupListMembers [groupname] [opt: domain]| List group members from the default or specified domain| |netLocalGroupList| netLocalGroupList [opt: server]| List local groups from the local or specified computer| |netLocalGroupListMembers| netLocalGroupListMembers [groupname] [opt: server]| List local groups from the local or specified computer| |netLocalGroupListMembers2| netLocalGroupListMembers2 [opt: groupname] [opt: server]| Modified version of `netLocalGroupListMembers` that supports BOFHound| |netloggedon| netloggedon [hostname]| Return users logged on the local or remote computer| |netloggedon2| netloggedon2 [opt: hostname]| Modified version of `netloggedon` that supports BOFHound| |netsession| netsession [opt:computer]| Enumerate sessions on the local or specified computer| |netsession2| netsession2 [opt:computer] [opt:resolution method] [opt:dns server]| Modified version of `netsession` that supports BOFHound| |netshares| netshares [hostname]| List shares on the local or remote computer| |netstat| netstat| TCP and UDP IPv4 listing ports| |nettime| nettime [hostname]| Display time on remote computer| |netuptime| netuptime [hostname]| Return information about the boot time on the local or remote computer| |netuser| netuser [username] [opt: domain]| Get info about specific user. Pull from domain if a domainname is specified| |netuse_add| netuse_add [sharename] [opt:username] [opt:password] [opt:/DEVICE:devicename] [opt:/PERSIST] [opt:/REQUIREPRIVACY]| Bind a new connection to a remote computer| |netuse_delete| netuse_delete [device\|\|sharename] [opt:/PERSIST] [opt:/FORCE]| Delete the bound device / sharename]| |netuse_list| netuse_list [opt:target]| List all bound share resources or info about target local resource| |netview| netview| List reachable computers in the current domain| |nslookup| nslookup [hostname] [opt:dns server] [opt: record type]| Make a DNS query.
DNS server is the server you want to query (do not specify or 0 for default)
record type is something like A, AAAA, or ANY. Some situations are limited due to observed crashes| |md5| md5 [filename]| Hash filename using md5| |probe| probe [host] [port]| Check if a specific port is open| |regsession| regsession [opt: hostname]| Return logged on user SIDs by enumerating HKEY_USERS. BOFHound compatible| |reg_query| [opt:hostname] [hive] [path] [opt: value to query]| Query a registry value or enumerate a single key| |reg_query_recursive| [opt:hostname] [hive] [path]| Recursively enumerate a key starting at path| |resources| resources| List memory usage and available disk space on the primary hard drive| |routeprint| routeprint| List IPv4 routes| |sc_enum| sc_enum [opt:server]| Enumerate services for qc, query, qfailure, and qtriggers info| |sc_qc| sc_qc [service name] [opt:server]| sc qc impelmentation in BOF| |sc_qdescription| sc_qdescription [service name] [opt: server]| sc qdescription implementation in BOF| |sc_qfailure| sc_qfailure [service name] [opt:server]| Query a service for failure conditions| |sc_qtriggerinfo| sc_qtriggerinfo [service name] [opt:server]| Query a service for trigger conditions| |sc_query| sc_query [opt: service name] [opt: server]| sc query implementation in BOF| |schtasksenum| schtasksenum [opt: server]| Enumerate scheduled tasks on the local or remote computer| |schtasksquery| schtasksquery [opt: server] [taskpath]| Query the given task on the local or remote computer| |sha1| sha1 [filename]| Hash filename using sha1| |sha256| sha256 [filename]| Hash filename using sha256| |tasklist| tasklist [opt: server]| List running processes including PID, PPID, and ComandLine (uses wmi)| |uptime| uptime| List system boot time and how long it has been running| |useridletime| useridletime| Shows how long the user as been idle, displayed in seconds, minutes, hours and days.| |vssenum| vssenum [hostname] [opt:sharename]| Enumerate Shadow Copies on some Server 2012+ servers| |whoami| whoami| List whoami /all| |windowlist| windowlist [opt:all]| List visible windows in the current user session| |wmi_query| wmi_query query [opt: server] [opt: namespace]| Run a wmi query and display results in CSV format| </details>
Click to view commands from outflanknl/C2-Tool-Collection These are commands available in the `outflanknl/C2-Tool-Collection` repo as per 2026-01-26. Note that you cannot click them from this repo, you have to visit the repo itself to view each BOF in detail. *Content manually copied from the repository. Please refer to the original for the most up-to-date information.* ## Available commands |Name|Decription| |----|----------| |**[AddMachineAccount](BOF/AddMachineAccount)**|Abuse default Active Directory machine quota settings (ms-DS-MachineAccountQuota) to add rogue machine accounts.| |**[Askcreds](BOF/Askcreds)**|Collect passwords by simply asking.| |**[CVE-2022-26923](BOF/CVE-2022-26923)**|CVE-2022-26923 Active Directory (ADCS) Domain Privilege Escalation exploit.| |**[Domaininfo](BOF/Domaininfo)**|Enumerate domain information using Active Directory Domain Services.| |**[FindObjects](BOF/FindObjects)**|Enumerate processes for specific loaded modules or process handles.| |**[Kerberoast](BOF/Kerberoast)**|List all SPN enabled user/service accounts or request service tickets (TGS-REP) which can be cracked offline using HashCat.| |**[KerbHash](BOF/KerbHash)**|Hash password to kerberos keys (rc4_hmac, aes128_cts_hmac_sha1, aes256_cts_hmac_sha1, and des_cbc_md5).| |**[Klist](BOF/Klist)**|Displays a list of currently cached Kerberos tickets.| |**[Lapsdump](BOF/Lapsdump)**|Dump LAPS passwords from specified computers within Active Directory.| |**[PetitPotam](BOF/PetitPotam)**|BOF implementation of the PetitPotam attack published by [@topotam77](https://twitter.com/topotam77).| |**[Psc](BOF/Psc)**|Show detailed information from processes with established TCP and RDP connections.| |**[Psw](BOF/Psw)**|Show window titles from processes with active windows.| |**[Psx](BOF/Psx)**|Show detailed information from all processes running on the system and provides a summary of installed security products and tools.| |**[Psm](BOF/Psm)**|Show detailed information from a specific process id (loaded modules, tcp connections e.g.).| |**[Psk](BOF/Psk)**|Show detailed information from the windows kernel and loaded driver modules and provides a summary of installed security products (AV/EDR drivers).| |**[ReconAD](BOF/ReconAD)**|Use ADSI to query Active Directory objects and attributes.| |**[Smbinfo](BOF/Smbinfo)**|Gather remote system version info using the NetWkstaGetInfo API without having to run the Cobalt Strike port (tcp-445) scanner.| |**[SprayAD](BOF/SprayAD)**|Perform a fast Kerberos or LDAP password spraying attack against Active Directory.| |**[StartWebClient](BOF/StartWebClient)**|Start the WebClient Service programmatically from user context using a service trigger.| |**[WdToggle](BOF/WdToggle)**|Patch lsass to enable WDigest credential caching and to circumvent Credential Guard (if enabled).| |**[Winver](BOF/Winver)**|Display the version of Windows that is running, the build number and patch release (Update Build Revision).| ***Others*** |Name|Decription| |----|----------| |**[PetitPotam](Other/PetitPotam)**|Reflective DLL implementation of the PetitPotam attack published by [@topotam77](https://twitter.com/topotam77)| |**[RemotePipeList](Other/RemotePipeList)**|.NET tool to enumerate remote named pipes|
Click to view commands from trustedsec/CS-Remote-OPs-BOF These are commands available in the `trustedsec/CS-Remote-OPs-BOF` repo as per 2026-01-26. Note that you cannot click them from this repo, you have to visit the repo itself to view each BOF in detail. *Content manually copied from the repository. Please refer to the original for the most up-to-date information.* ## Available commands |Command|Notes| |-------|-----| |adcs_request| Request an enrollment certificate| |adcs_request_on_behalf| Request an enrollment certificate on behalf of another user| |adduser| Add specified user to a machine| |addusertogroup| Add specified user to a group| |ask_mfa| Displays a fake Microsoft Authenticator approval dialog with the specified number| |chromeKey| Decrypt the provided base64 encoded Chrome key| |enableuser| Enable and unlock the specified user account| |get_azure_token| Attempts to complete an OAuth codeflow grant against azure using saved logins | |get_priv| Activate the specified token privledge, more for non-cobalt strike users| |global_unprotect| Locates and Decrypts GlobalProtect config files converted from: [GlobalUnProtect](https://github.com/rotarydrone/GlobalUnProtect/tree/409d64b097e0a928a5545051e40e1566e9c26bd0)| |lastpass | Search Chrome, brave memory for LastPass passwords and data| |make_token_cert| impersonates a user using the altname of a .pfx file | |office_tokens| Collect Office JWT Tokens from any Office process| |procdump| Dump the specified process to the specified output file| |ProcessDestroy| Close handle(s) in a process| |ProcessListHandles| List all open handles in a specified process| |reg_delete| Delete a registry key| |reg_save| Save a registry hive to disk| |reg_set| Set / create a registry key| |sc_config| Configure an existing service| |sc_create| Create a new service| |sc_delete| Delete an existing service| |sc_failure| Configures the actions upon failure of an existing service| |sc_description| Modify an existing services description| |sc_start| Start an existing service| |sc_stop| Stop an existing service| |schtaskscreate| Create a new scheduled task (via xml definition)| |schtasksdelete| Delete an existing scheduled task| |schtasksrun| Start a scheduled task| |schtasksstop| Stop a running scheduled task| |setuserpass| Set a user's password| |shspawnas| A misguided attempt at injecting code into a newly spawned process| |shutdown| Shutdown or reboot a local or remote computer, with or without a warning/message |slack_cookie| Collect the Slack authentication cookie from a Slack process| |unexpireuser| Set a user account to never expire| |ghost_task| Add/Delete a ghost task.
Click to view commands from REDMED-X/OperatorsKit These are commands available in the `REDMED-X/OperatorsKit` repo as per 2026-01-26. Note that you cannot click them from this repo, you have to visit the repo itself to view each BOF in detail. *Content manually copied from the repository. Please refer to the original for the most up-to-date information.* ## Available commands |Name|Description| |----|----------| |**[AddExclusion](KIT/AddExclusion)**|Add a new exclusion to Windows Defender for a folder, file, process or extension.| |**[AddFirewallRule](KIT/AddFirewallRule)**|Add a new inbound/outbound firewall rule.| |**[AddLocalCert](KIT/AddLocalCert)**|Add a (self signed) certificate to a specific local computer certificate store.| |**[AddTaskScheduler](KIT/AddTaskScheduler)**|Create a scheduled task on the current- or remote host.| |**[BlindEventlog](KIT/BlindEventlog)**|Blind Eventlog by suspending its threads.| |**[CaptureNetNTLM](KIT/CaptureNetNTLM)**|Capture the NetNTLMv2 hash of the current user.| |**[CredPrompt](KIT/CredPrompt)**|Start persistent credential prompt in an attempt to capture user credentials.| |**[DelExclusion](KIT/DelExclusion)**|Delete an exclusion from Windows Defender for a folder, file, process or extension.| |**[DelFirewallRule](KIT/DelFirewallRule)**|Delete a firewall rule.| |**[DelLocalCert](KIT/DelLocalCert)**|Delete a local computer certificate from a specific store.| |**[DelTaskScheduler](KIT/DelTaskScheduler)**|Delete a scheduled task on the current- or a remote host.| |**[DllComHijacking](KIT/DllComHijacking)**|Leverage DLL Hijacking by instantiating a COM object on a target host | |**[DllEnvHijacking](KIT/DllEnvHijacking)**|BOF implementation of DLL environment hijacking.| |**[EnumDotnet](KIT/EnumDotnet)**|Enumerate processes that most likely have .NET loaded.| |**[EnumDrives](KIT/EnumDrives)**|Enumerate drive letters and type.| |**[EnumExclusions](KIT/EnumExclusions)**|Check the AV for excluded files, folders, extentions and processes.| |**[EnumFiles](KIT/EnumFiles)**|Search for matching files based on a word, extention or keyword in the file content.| |**[EnumHandles](KIT/EnumHandles)**|Enumerate "process" and "thread" handle types between processes.| |**[EnumLib](KIT/EnumLib)**|Enumerate loaded module(s) in remote process(es).| |**[EnumLocalCert](KIT/EnumLocalCert)**|Enumerate all local computer certificates from a specific store.| |**[EnumRWX](KIT/EnumRWX)**|Enumerate RWX memory regions in a target process.| |**[EnumSecProducts](KIT/EnumSecProducts)**|Enumerate security products (like AV/EDR) that are running on the current/remote host.| |**[EnumShares](KIT/EnumShares)**|Enumerate remote shares and your access level using a predefined list with hostnames.| |**[EnumSysmon](KIT/EnumSysmon)**|Verify if Sysmon is running by checking the registry and listing Minifilter drivers.| |**[EnumTaskScheduler](KIT/EnumTaskScheduler)**|Enumerate all scheduled tasks in the root folder.| |**[EnumWebClient](KIT/EnumWebClient)**|Find hosts with the WebClient service running based on a list with predefined hostnames.| |**[EnumWSC](KIT/EnumWSC)**|List what security products are registered in Windows Security Center.| |**[ExecuteCrossSession](KIT/ExecuteCrossSession)**|Execute a binary in the context of another user via COM cross-session interaction| |**[ForceLockScreen](KIT/ForceLockScreen)**|Force the lock screen of the current user session.| |**[HideFile](KIT/HideFile)**|Hide a file or directory by setting it's attributes to systemfile + hidden.| |**[IdleTime](KIT/IdleTime)**|Check current user activity based on the user's last input.| |**[InjectPoolParty](KIT/InjectPoolParty)**|Inject beacon shellcode and execute it via Windows Thread Pools.| |**[KeyloggerRawInput](KIT/KeyloggerRawInput)**|Keylogger based on RegisterRawInputDevices.| |**[LoadLib](KIT/LoadLib)**|Load an on disk present DLL via RtlRemoteCall API in a remote process.| |**[PSremote](KIT/PSremote)**|Enumerate all running processes on a remote host.| |**[PasswordSpray](KIT/PasswordSpray)**|Validate a single password against multiple accounts using kerberos authentication.| |**[SilenceSysmon](KIT/SilenceSysmon)**|Silence the Sysmon service by patching its capability to write ETW events to the log.| |**[SystemInfo](KIT/SystemInfo)**|Enumerate system information via WMI (limited use case).| |**[WiFiPasswords](KIT/WiFiPasswords)**|Enumerates all saved SSID's, then retrieves each AP's stored plaintext password.|
## 📚 Lists of BOFs These pages primarily serve as curated lists or collections of links to *other* BOF repositories, rather than containing BOF code themselves. *Note*: This project has already scraped and included all BOFs from these lists. | Project | Description | Stars | Last commit | |---------|-------------|-------|-------------| | [Awesome-CobaltStrike](https://github.com/zer0yu/Awesome-CobaltStrike?tab=readme-ov-file#0x03-bof) | Includes a massive list of public BOF projects | ![](https://img.shields.io/github/stars/zer0yu/Awesome-CobaltStrike?label=&style=flat) | ![](https://img.shields.io/github/last-commit/zer0yu/Awesome-CobaltStrike?label=&style=flat) | | [BofAllTheThings](https://github.com/N7WEra/BofAllTheThings) | Master curated list of public BOF repos with categorization and documentation | ![](https://img.shields.io/github/stars/N7WEra/BofAllTheThings?label=&style=flat) | ![](https://img.shields.io/github/last-commit/N7WEra/BofAllTheThings?label=&style=flat) | | [CobaltStrike_BOF_Collections](https://github.com/wsummerhill/C2_RedTeam_CheatSheets/blob/main/CobaltStrike/BOF_Collections.md) | Useful BOFs collected and used during red team ops | ![](https://img.shields.io/github/stars/wsummerhill/C2_RedTeam_CheatSheets?label=&style=flat) | ![](https://img.shields.io/github/last-commit/wsummerhill/C2_RedTeam_CheatSheets?label=&style=flat) | | [BOFs](https://github.com/BOFs/BOFs) | General-purpose Beacon Object Files repository | ![](https://img.shields.io/github/stars/BOFs/BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/BOFs/BOFs?label=&style=flat) | | [BOF-CobaltStrike](https://github.com/hrtywhy/BOF-CobaltStrike) | Cobalt Strike BOFs used during red team engagements | ![](https://img.shields.io/github/stars/hrtywhy/BOF-CobaltStrike?label=&style=flat) | ![](https://img.shields.io/github/last-commit/hrtywhy/BOF-CobaltStrike?label=&style=flat) | | [DPAPI_BOF](https://github.com/Bhanunamikaze/DPAPI_BOF) | SharpDPAPI ported to Cobalt Strike BOFs — 19 self-contained BOFs for DPAPI credential triage | ![](https://img.shields.io/github/stars/Bhanunamikaze/DPAPI_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Bhanunamikaze/DPAPI_BOF?label=&style=flat) | --- ## 🤏 Smaller BOF Packs Repositories typically containing a small number (e.g., 3-4) of specific BOFs or a collection to target one specific technology (like Kerberos). *Note*: I've used AI to make python script to make a *best effort* attempt at extracting and including list of BOFs from each repo for easy reference. | Project | Description | Includes | Stars | Last commit | |---------|-------------|----------|-------|-------------| | [Adrenaline](https://github.com/atomiczsec/Adrenaline) | Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing. | ![](https://img.shields.io/github/stars/atomiczsec/Adrenaline?label=&style=flat) | ![](https://img.shields.io/github/last-commit/atomiczsec/Adrenaline?label=&style=flat) | | [BofArsenal](https://github.com/xRedCodex/BofArsenal) | The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23 | ![](https://img.shields.io/github/stars/xRedCodex/BofArsenal?label=&style=flat) | ![](https://img.shields.io/github/last-commit/xRedCodex/BofArsenal?label=&style=flat) | | [BOF_Collection](https://github.com/rvrsh3ll/BOF_Collection) | Various Cobalt Strike BOFs (Collection) | `dumpwifi.c`, `enumwifi`, `GetClipboard.c`, `GetClipboard.o`, `GetDomainInfo.c`, `GetDomainInfo.o`, `PortScan.c`, `RegistryPersistence.c`, `RegistryPersistence.o` | ![](https://img.shields.io/github/stars/rvrsh3ll/BOF_Collection?label=&style=flat) | ![](https://img.shields.io/github/last-commit/rvrsh3ll/BOF_Collection?label=&style=flat) | | [BOFs](https://github.com/ajpc500/BOFs) | General BOF collection from ajpc500, including a useful Curl BOF | `BeaconSpawnTemporaryProcess`, `check_function`, `Create`, `Fetch`, `Inject`, `inject_dll.c`, `Patch`, `Read`, `read_function`, `Unhook` | ![](https://img.shields.io/github/stars/ajpc500/BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ajpc500/BOFs?label=&style=flat) | | [PrivKit](https://github.com/mertdas/PrivKit) | PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS. | `cfile.c`, `ofile.o`, `tokenprivileges.o` | ![](https://img.shields.io/github/stars/mertdas/PrivKit?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mertdas/PrivKit?label=&style=flat) | | [UAC-BOF-Bonanza](https://github.com/icyguider/UAC-BOF-Bonanza) | Collection of UAC Bypass Techniques Weaponized as BOFs | `AcquireModernLicenseWithPreviousId`, `All`, `CmstpElevatedCOM`, `ColorDataProxy`, `DisplayCalibrator`, `EditionUpgradeManager`, `entry.c`, `LaunchDccw`, `make`, `RegistryShellCommand`, `Required`, `SetRegistryStringValue`, `ShellExec`, `SilentCleanupWinDir`, `SspiUacBypass`, `TrustedPathDLLHijack` | ![](https://img.shields.io/github/stars/icyguider/UAC-BOF-Bonanza?label=&style=flat) | ![](https://img.shields.io/github/last-commit/icyguider/UAC-BOF-Bonanza?label=&style=flat) | | [SQL-BOF](https://github.com/Tw1sm/SQL-BOF) | Library of BOFs to interact with SQL servers | `Available`, `sql-1434udp`, `sql-adsi`, `sql-agentcmd`, `sql-agentstatus`, `sql-checkrpc`, `sql-clr`, `sql-columns`, `sql-databases`, `sql-disableclr`, `sql-disableole`, `sql-disablerpc`, `sql-disablexp`, `sql-enableclr`, `sql-enableole`, `sql-enablerpc`, `sql-enablexp`, `sql-impersonate`, `sql-info`, `sql-links`, `sql-olecmd`, `sql-query`, `sql-rows`, `sql-search`, `sql-smb`, `sql-tables`, `sql-users`, `sql-whoami`, `sql-xpcmd` | ![](https://img.shields.io/github/stars/Tw1sm/SQL-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Tw1sm/SQL-BOF?label=&style=flat) | | [Kerbeus-BOF](https://github.com/RalfHacker/Kerbeus-BOF) | Kerberos abuse toolkit implemented as BOF (Rubeus-style) | `asktgs`, `asktgt`, `changepw`, `CS-Situational-Awareness-BOF`, `describe`, `dump`, `FORWARDABLE`, `hash`, `kerberoasting`, `klist`, `msds-allowedtodelegateto`, `must`, `nanorobeus`, `ptt`, `purge`, `renew`, `Rubeus`, `tgtdeleg`, `triage`, `TrustedToAuthForDelegation` | ![](https://img.shields.io/github/stars/RalfHacker/Kerbeus-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/RalfHacker/Kerbeus-BOF?label=&style=flat) | | [BRC4-BOF-Artillery](https://github.com/paranoidninja/BRC4-BOF-Artillery) | Brute Ratel-focused BOF utilities | `BR-Remote-Ops`, `BRc4-Generic`, `Generic`, `Kerbeus`, `Kerbeus-BOF`, `Operators-Kit`, `OperatorsKit`, `ThreadPoolInjection` | ![](https://img.shields.io/github/stars/paranoidninja/BRC4-BOF-Artillery?label=&style=flat) | ![](https://img.shields.io/github/last-commit/paranoidninja/BRC4-BOF-Artillery?label=&style=flat) | | [CobaltStrike-BOF](https://github.com/Yaxser/CobaltStrike-BOF) | Collection of BOFs for learning Cobalt Strike internals | `DCOM Lateral Movement`, `WMI Lateral Movement` | ![](https://img.shields.io/github/stars/Yaxser/CobaltStrike-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Yaxser/CobaltStrike-BOF?label=&style=flat) | | [BOFs](https://github.com/Wanssss1/BOFs) | BOFs for Cobalt Strike and Havoc C2, focusing on Active Directory attacks and post-exploitation techniques | | ![](https://img.shields.io/github/stars/Wanssss1/BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Wanssss1/BOFs?label=&style=flat) | | [PBOF](https://github.com/jaytiwari05/PBOF) | Collection of custom BOF (Beacon Object Files) for red team operations — focused on stealth, performance, and low-level C development. | | ![](https://img.shields.io/github/stars/jaytiwari05/PBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/jaytiwari05/PBOF?label=&style=flat) | | [ldap_bofs](https://github.com/muhammadmehdi1656/ldap_bofs) | LDAP proxying BOFs with helper scripts for implementation and setup | | ![](https://img.shields.io/github/stars/muhammadmehdi1656/ldap_bofs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/muhammadmehdi1656/ldap_bofs?label=&style=flat) | | [BOF-pack-1](https://github.com/jsecu/BOF-pack-1) | A care package of useful bofs for red team engagments | Includes `GetAppLockerPolicy`, `TokenElevate` and `PrivChanger`. | ![](https://img.shields.io/github/stars/jsecu/BOF-pack-1?label=&style=flat) | ![](https://img.shields.io/github/last-commit/jsecu/BOF-pack-1?label=&style=flat) | | [MagicBOFs](https://github.com/Yeeb1/MagicBOFs) | A themed set of Beacon Object Files inspired by Magic: The Gathering |`curl`, `DropOfHoney`, `Mimikatz`, `TappingAtTheWindow`, `tspatch.c`, `WarpWorld` | ![](https://img.shields.io/github/stars/Yeeb1/MagicBOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Yeeb1/MagicBOFs?label=&style=flat) | | [BOFCode](https://github.com/Mr-Un1k0d3r/BOFCode) | A collection of general-purpose BOFs | multiple: `elevate_pid`, `env`, etc. | ![](https://img.shields.io/github/stars/Mr-Un1k0d3r/BOFCode?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Mr-Un1k0d3r/BOFCode?label=&style=flat) | | [aad-bofs](https://github.com/kozmer/aad-bofs) | AzureAD-focused Beacon Object Files | `imds_management_token`, `request_aad_prt` | ![](https://img.shields.io/github/stars/kozmer/aad-bofs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/kozmer/aad-bofs?label=&style=flat) | | [QoL-BOFs](https://github.com/ZephrFish/QoL-BOFs) | Curated BOFs with submodules for cloning and use | `BOF-patchit`, `ChromeKatz`, `Cobalt-Clip`, `cobaltstrike-cat-bof`, `Contributions`, `Defender-Exclusions-Creator`, `EDREnum`, `inject-assembly`, `InlineExecute-Assembly`, `Kerbeus-BOF`, `Koh`, `MiniDumpWriteDump`, `nanorobeus`, `PrivKit`, `QoL-BOFs`, `ScreenshotBOF`, `SilentLsassDump`, `Simplified`, `SQL-BOF`, `tgtdelegation`, `Uses`, `WdToggle`, `whereami`, `xPipe` | ![](https://img.shields.io/github/stars/ZephrFish/QoL-BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ZephrFish/QoL-BOFs?label=&style=flat) | | [proctools](https://github.com/mlcsec/proctools) | Extract information and dump sensitive strings from processes via BOFs | `__chkstk`, `company`, `Inline-Execute-PE`, `internal`, `kill`, `legal`, `private`, `procargs`, `procargs-BOF.c`, `procargs-BOF.o`, `procargs.c`, `procinfo`, `procinfo-BOF.c`, `procinfo-BOF.o`, `prockill`, `prockill-BOF.c`, `prockill-BOF.o`, `procsearch`, `procsearch-BOF.c`, `procsearch-BOF.o`, `product`, `searches`, `special` | ![](https://img.shields.io/github/stars/mlcsec/proctools?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mlcsec/proctools?label=&style=flat) | | [BOF_Files](https://github.com/ricardojoserf/BOF_Files) | Repository to gather personal BOF developments | `NestedZipper`, `Zipper` | ![](https://img.shields.io/github/stars/ricardojoserf/BOF_Files?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ricardojoserf/BOF_Files?label=&style=flat) | | [BOFs](https://github.com/JamesCooteUK/BOFs) | Personal collection of Beacon Object Files | `sharefolder_create`, `sharefolder_delete` | ![](https://img.shields.io/github/stars/JamesCooteUK/BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/JamesCooteUK/BOFs?label=&style=flat) | | [cobaltstrike_bofs](https://github.com/m57/cobaltstrike_bofs) | Collection of BOFs used with Cobalt Strike | `Dump`, `SeBackupPrivilege` | ![](https://img.shields.io/github/stars/m57/cobaltstrike_bofs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/m57/cobaltstrike_bofs?label=&style=flat) | | [BOFs](https://github.com/guervild/BOFs) | Collection of BOFs by guervild, including a SilentLsassDump | `CredEnum`, `WindowsVault` | ![](https://img.shields.io/github/stars/guervild/BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/guervild/BOFs?label=&style=flat) | | [CS-BOFs](https://github.com/pwn1sher/CS-BOFs) | Collection of Cobalt Strike BOFs | `defender-exclusions`, `get-loggedon`, `get-system`, `lsass` | ![](https://img.shields.io/github/stars/pwn1sher/CS-BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/pwn1sher/CS-BOFs?label=&style=flat) | | [BOFs](https://github.com/RiccardoAncarani/BOFs) | Miscellaneous BOFs like `cat` | `cat`, `NOTE`, `send_shellcode_via_pipe`, `unhook`, `wts_enum_remote_processes` | ![](https://img.shields.io/github/stars/RiccardoAncarani/BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/RiccardoAncarani/BOFs?label=&style=flat) | | [bofs](https://github.com/ndur0/bofs) | Home Directory path modification via LDAP | `aka`, `dcsync`, `decrypt`, `separate`, `use` | ![](https://img.shields.io/github/stars/ndur0/bofs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ndur0/bofs?label=&style=flat) | | [BOF_All_Things](https://github.com/Patrick0x41/BOF_All_Things) | Beacon Object Files (BOF) for Cobalt Strike | `detect-hooks` | ![](https://img.shields.io/github/stars/Patrick0x41/BOF_All_Things?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Patrick0x41/BOF_All_Things?label=&style=flat) | | [bof-collection](https://github.com/crypt0p3g/bof-collection) | General collection of BOFs for Cobalt Strike | `BOF.o`, `ES_CONTINUOUS`, `ES_SYSTEM_REQUIRED`, `FoBOF.o`, `MinGW`, `Sleeping`, `Visual`, `x64.o` | ![](https://img.shields.io/github/stars/crypt0p3g/bof-collection?label=&style=flat) | ![](https://img.shields.io/github/last-commit/crypt0p3g/bof-collection?label=&style=flat) | | [BeaconObjectFile](https://github.com/chrispentester/BeaconObjectFile) | BOF Collection by chrispentester. | `Compile`, `Load`, `Run` | ![](https://img.shields.io/github/stars/chrispentester/BeaconObjectFile?label=&style=flat) | ![](https://img.shields.io/github/last-commit/chrispentester/BeaconObjectFile?label=&style=flat) | | [BOFs](https://github.com/dust-life/BOFs) | Beacon Object Files collection by dust-life. | `BSOD`, `EnablePriv` | ![](https://img.shields.io/github/stars/dust-life/BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/dust-life/BOFs?label=&style=flat) | | [cobaltstrike-bof-toolset](https://github.com/3as0n/cobaltstrike-bof-toolset) | Collection of BOF tools for Cobalt Strike (Chinese description) | `https` | ![](https://img.shields.io/github/stars/3as0n/cobaltstrike-bof-toolset?label=&style=flat) | ![](https://img.shields.io/github/last-commit/3as0n/cobaltstrike-bof-toolset?label=&style=flat) | | [bof-collection](https://github.com/matro7sh/bof-collection) | Collection of beacon object file (Cobalt strike) by matro7sh. | `getAV.c`, `getAV.o`, `PathToFile.o`, `RegCloseKey` | ![](https://img.shields.io/github/stars/matro7sh/bof-collection?label=&style=flat) | ![](https://img.shields.io/github/last-commit/matro7sh/bof-collection?label=&style=flat) | | [BasicBOFs](https://github.com/r00t0v3rr1d3/BasicBOFs) | A collection of assorted BOFs by r00t0v3rr1d3. | `touch` | ![](https://img.shields.io/github/stars/r00t0v3rr1d3/BasicBOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/r00t0v3rr1d3/BasicBOFs?label=&style=flat) | | [BOF](https://github.com/aahmad097/BOF) | Beacon-Object-Files collection by aahmad097. | `luser` | ![](https://img.shields.io/github/stars/aahmad097/BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/aahmad097/BOF?label=&style=flat) | | [Cobalt-BOFs-and-CNA](https://github.com/Nagomez97/Cobalt-BOFs-and-CNA) | Cobalt BOFs and CNA collection by Nagomez97. | `beacon.o`, `Fobeacon.o` | ![](https://img.shields.io/github/stars/Nagomez97/Cobalt-BOFs-and-CNA?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Nagomez97/Cobalt-BOFs-and-CNA?label=&style=flat) | | [BOF-Learning](https://github.com/Workingdaturah/BOF-Learning) | Cobalt Strike BOFS | `Get-OSInfo`, `NetSessionEnum` | ![](https://img.shields.io/github/stars/Workingdaturah/BOF-Learning?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Workingdaturah/BOF-Learning?label=&style=flat) | | [Beacon-Object-File-Library](https://github.com/Ap3x/Beacon-Object-File-Library) | A library of different Beacon Object Files in Visual Studio Solution | `EnumDeviceDrivers`, `FileExfiltrationUrlEncoded`, `Ipconfig`, `RegistryPersistence`, `TimeStomp`, `WhoAmI` | ![](https://img.shields.io/github/stars/Ap3x/Beacon-Object-File-Library?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Ap3x/Beacon-Object-File-Library?label=&style=flat) | | [bof_collection](https://github.com/beune/bof_collection) | BOFs using Remote Registry Protocol for registry/file enumeration and patch level detection | `hklm_exists`, `disk_exists`, `patchlevel` | ![](https://img.shields.io/github/stars/beune/bof_collection?label=&style=flat) | ![](https://img.shields.io/github/last-commit/beune/bof_collection?label=&style=flat) | --- ## C2 specific BOFs This category includes BOFs that were written specifically for a C2 framework that is not Cobalt Strike, like Havoc or Sliver. | Project | Description | Stars | Last commit | |---------|-------------|-------|-------------| | [PersisTask-BOF-AdaptixC2](https://github.com/giovannicolonna/PersisTask-BOF-AdaptixC2) | PersisTask BOF for Adaptixc2 | ![](https://img.shields.io/github/stars/giovannicolonna/PersisTask-BOF-AdaptixC2?label=&style=flat) | ![](https://img.shields.io/github/last-commit/giovannicolonna/PersisTask-BOF-AdaptixC2?label=&style=flat) | | [BRC_BOFS](https://github.com/0xMorph3us/BRC_BOFS) | [No description provided] | ![](https://img.shields.io/github/stars/0xMorph3us/BRC_BOFS?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xMorph3us/BRC_BOFS?label=&style=flat) | | [havoc-privkit](https://github.com/p4p1/havoc-privkit) | A port of privkit beacon object files for havoc. | ![](https://img.shields.io/github/stars/p4p1/havoc-privkit?label=&style=flat) | ![](https://img.shields.io/github/last-commit/p4p1/havoc-privkit?label=&style=flat) | | [Havoc-BOF-Development](https://github.com/CyberSecurityUP/Havoc-BOF-Development) | Havoc BOF Development examples/collection. | ![](https://img.shields.io/github/stars/CyberSecurityUP/Havoc-BOF-Development?label=&style=flat) | ![](https://img.shields.io/github/last-commit/CyberSecurityUP/Havoc-BOF-Development?label=&style=flat) | | [Havoc_uac_sspi_bof](https://github.com/Sh4N4C1/Havoc_uac_sspi_bof) | UAC bypass using SSPI (BOF for Havoc) | ![](https://img.shields.io/github/stars/Sh4N4C1/Havoc_uac_sspi_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Sh4N4C1/Havoc_uac_sspi_bof?label=&style=flat) | | [hello-world-bof-havoc-c2](https://github.com/100daysofredteam/hello-world-bof-havoc-c2) | Minimalistic beacon object file for Havoc C2. | ![](https://img.shields.io/github/stars/100daysofredteam/hello-world-bof-havoc-c2?label=&style=flat) | ![](https://img.shields.io/github/last-commit/100daysofredteam/hello-world-bof-havoc-c2?label=&style=flat) | | [detect-hooks](https://github.com/zimnyaa/detect-hooks) | Port of Detect-Hooks for Sliver C2 | ![](https://img.shields.io/github/stars/zimnyaa/detect-hooks?label=&style=flat) | ![](https://img.shields.io/github/last-commit/zimnyaa/detect-hooks?label=&style=flat) | | [sliver-bof-hello-world](https://github.com/1mansh0w/sliver-bof-hello-world) | Hello World BOF for Sliver C2. | ![](https://img.shields.io/github/stars/1mansh0w/sliver-bof-hello-world?label=&style=flat) | ![](https://img.shields.io/github/last-commit/1mansh0w/sliver-bof-hello-world?label=&style=flat) | | [armory](https://github.com/FarrimWildaxe/armory) | BOF Armory for Sliver C2. | ![](https://img.shields.io/github/stars/FarrimWildaxe/armory?label=&style=flat) | ![](https://img.shields.io/github/last-commit/FarrimWildaxe/armory?label=&style=flat) | | [tgtdelegation (fork) ](https://github.com/sliverarmory/tgtdelegation) | BOF to obtain a TGT via delegation trick (forked) for Sliver | ![](https://img.shields.io/github/stars/sliverarmory/tgtdelegation?label=&style=flat) | ![](https://img.shields.io/github/last-commit/sliverarmory/tgtdelegation?label=&style=flat) | | [bof-collection](https://github.com/NioZow/bof-collection) | BOF collection by NioZow. Includes keylogger, sammy, token-vault, window list (havoc) | ![](https://img.shields.io/github/stars/NioZow/bof-collection?label=&style=flat) | ![](https://img.shields.io/github/last-commit/NioZow/bof-collection?label=&style=flat) | | [tgtdeleg](https://github.com/zimnyaa/tgtdeleg) | https://github.com/connormcgarr/tgtdelegation for use with sliver | ![](https://img.shields.io/github/stars/zimnyaa/tgtdeleg?label=&style=flat) | ![](https://img.shields.io/github/last-commit/zimnyaa/tgtdeleg?label=&style=flat) | | [SliverBOFs](https://github.com/Steve0ro/SliverBOFs) | My collection of BOFs used for Sliver-C2 | ![](https://img.shields.io/github/stars/Steve0ro/SliverBOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Steve0ro/SliverBOFs?label=&style=flat) | | [havoc-PoolParty](https://github.com/Cipher7/havoc-PoolParty) | Windows Thread Pool Injection Havoc Implementation | ![](https://img.shields.io/github/stars/Cipher7/havoc-PoolParty?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Cipher7/havoc-PoolParty?label=&style=flat) | | [Remote-BOF-Runner](https://github.com/pard0p/Remote-BOF-Runner) | Havoc extension framework for remote execution of BOFs using a PIC loader made with Crystal Palace | ![](https://img.shields.io/github/stars/pard0p/Remote-BOF-Runner?label=&style=flat) | ![](https://img.shields.io/github/last-commit/pard0p/Remote-BOF-Runner?label=&style=flat) | | [DCSync-Bof](https://github.com/P0142/DCSync-Bof) | BOF to dump domain credentials via DRSGetNCChanges, for the Adaptix C2 | ![](https://img.shields.io/github/stars/P0142/DCSync-Bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/P0142/DCSync-Bof?label=&style=flat) | | [LSAdump-BOF](https://github.com/shashinma/LSAdump-BOF) | Adaptix BOF for credential extraction — dumps LSA secrets, SAM hashes, and cached domain credentials | ![](https://img.shields.io/github/stars/shashinma/LSAdump-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/shashinma/LSAdump-BOF?label=&style=flat) | | [NBTscan-BOF](https://github.com/shashinma/NBTscan-BOF) | Adaptix BOF for NetBIOS reconnaissance — discovers names, MAC addresses, and services of Windows hosts | ![](https://img.shields.io/github/stars/shashinma/NBTscan-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/shashinma/NBTscan-BOF?label=&style=flat) | | [VaultDumpBOF](https://github.com/MeirV2-2/VaultDumpBOF) | Adaptix BOF to harvest Windows Vaults and Generic Credentials via thread impersonation and DPAPI | ![](https://img.shields.io/github/stars/MeirV2-2/VaultDumpBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/MeirV2-2/VaultDumpBOF?label=&style=flat) | | [CredEnumBOF](https://github.com/0x2LFA/CredEnumBOF) | Sliver BOF to enumerate Windows Credential Manager entries via CredEnumerateW | ![](https://img.shields.io/github/stars/0x2LFA/CredEnumBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x2LFA/CredEnumBOF?label=&style=flat) | | [PersistenceBOF](https://github.com/zachmarmolejo/PersistenceBOF) | Scheduled Task Persistence BOF for Havoc C2 | ![](https://img.shields.io/github/stars/zachmarmolejo/PersistenceBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/zachmarmolejo/PersistenceBOF?label=&style=flat) | | [EDR-Enum-BOF](https://github.com/DarksBlackSk/EDR-Enum-BOF) | EDR/AV enumeration BOF ported to AdaptixC2 — detects 444 signatures across 48 security vendors | ![](https://img.shields.io/github/stars/DarksBlackSk/EDR-Enum-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/DarksBlackSk/EDR-Enum-BOF?label=&style=flat) | | [Adaptix-inject-auto](https://github.com/Svinopesik/Adaptix-inject-auto) | Auto-injection BOF for AdaptixC2 — injects into system processes like svchost.exe and winlogon.exe | ![](https://img.shields.io/github/stars/Svinopesik/Adaptix-inject-auto?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Svinopesik/Adaptix-inject-auto?label=&style=flat) | | [Keylogger-BOF](https://github.com/DarksBlackSk/Keylogger-BOF) | Async keylogger BOF for AdaptixC2 using WH_KEYBOARD_LL hook with shared memory IPC | ![](https://img.shields.io/github/stars/DarksBlackSk/Keylogger-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/DarksBlackSk/Keylogger-BOF?label=&style=flat) | | [LSAWhisperer-BOF](https://github.com/Art-Fakt/LSAWhisperer-BOF) | Port of LSA-Whisperer by Evan McBroom / SpecterOps to the Adaptix C2 BOF framework | ![](https://img.shields.io/github/stars/Art-Fakt/LSAWhisperer-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Art-Fakt/LSAWhisperer-BOF?label=&style=flat) | | [NOFILTER-NFEXEC](https://github.com/y637F9QQ2x/NOFILTER-NFEXEC) | Havoc C2 BOF — WFP kernel-space SYSTEM escalation + command execution with indirect syscalls, patchless AMSI/ETW bypass, and return address spoofing | ![](https://img.shields.io/github/stars/y637F9QQ2x/NOFILTER-NFEXEC?label=&style=flat) | ![](https://img.shields.io/github/last-commit/y637F9QQ2x/NOFILTER-NFEXEC?label=&style=flat) | | [PSIMPORT](https://github.com/y637F9QQ2x/PSIMPORT) | Havoc C2 BOF — Cobalt Strike powershell-import equivalent with patchless AMSI/ETW bypass | ![](https://img.shields.io/github/stars/y637F9QQ2x/PSIMPORT?label=&style=flat) | ![](https://img.shields.io/github/last-commit/y637F9QQ2x/PSIMPORT?label=&style=flat) | | [BLINDSPOT](https://github.com/y637F9QQ2x/BLINDSPOT) | Havoc C2 BOF — detect running security products | ![](https://img.shields.io/github/stars/y637F9QQ2x/BLINDSPOT?label=&style=flat) | ![](https://img.shields.io/github/last-commit/y637F9QQ2x/BLINDSPOT?label=&style=flat) | | [MUTESONAR](https://github.com/y637F9QQ2x/MUTESONAR) | Havoc C2 BOF — host enumeration without spawning cmd.exe or PowerShell | ![](https://img.shields.io/github/stars/y637F9QQ2x/MUTESONAR?label=&style=flat) | ![](https://img.shields.io/github/last-commit/y637F9QQ2x/MUTESONAR?label=&style=flat) | | [RegPwnBRc4BOF](https://github.com/n0isegat3/RegPwnBRc4BOF) | Brute Ratel C4 BOF for CVE-2026-24291 registry symlink race condition LPE | ![](https://img.shields.io/github/stars/n0isegat3/RegPwnBRc4BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/n0isegat3/RegPwnBRc4BOF?label=&style=flat) | | [havoc-wallpaper-BOF](https://github.com/b3at1/havoc-wallpaper-BOF) | Havoc C2 BOF — change the user's desktop wallpaper | ![](https://img.shields.io/github/stars/b3at1/havoc-wallpaper-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/b3at1/havoc-wallpaper-BOF?label=&style=flat) | | [BAADTokenBroker](https://github.com/temp43487580/BAADTokenBroker) | Sliver BOF for Microsoft Entra ID device-bound keys — PRT cookies, TGTs, and NT hashes | ![](https://img.shields.io/github/stars/temp43487580/BAADTokenBroker?label=&style=flat) | ![](https://img.shields.io/github/last-commit/temp43487580/BAADTokenBroker?label=&style=flat) | | [UnderlayCopy_bof](https://github.com/Muz1K1zuM/UnderlayCopy_bof) | Havoc BOF to copy locked files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing — no VSS or PowerShell | ![](https://img.shields.io/github/stars/Muz1K1zuM/UnderlayCopy_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Muz1K1zuM/UnderlayCopy_bof?label=&style=flat) | | [kslkatz_bof](https://github.com/Muz1K1zuM/kslkatz_bof) | Havoc BOF — KslD.sys BYOVD credential extraction from lsass via physical memory | ![](https://img.shields.io/github/stars/Muz1K1zuM/kslkatz_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Muz1K1zuM/kslkatz_bof?label=&style=flat) | | [Collection-BOF-Adaptix](https://github.com/DarksBlackSk/Collection-BOF-Adaptix) | Adaptix BOF collection — WiFi, clipboard, EDR enum, keylogger, ghost_task, service control | ![](https://img.shields.io/github/stars/DarksBlackSk/Collection-BOF-Adaptix?label=&style=flat) | ![](https://img.shields.io/github/last-commit/DarksBlackSk/Collection-BOF-Adaptix?label=&style=flat) | --- ## 🧩 Other BOFs This category includes single-purpose BOFs, specialized tools, loaders, templates, frameworks, exploit implementations, specific technique implementations, forks, and any other BOF projects not fitting the categories above. *Not sorted in any specific order.* | Project | Description | Stars | Last commit | |---------|-------------|-------|-------------| | [dumpguard_bof](https://github.com/0xedh/dumpguard_bof) | Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems. | ![](https://img.shields.io/github/stars/0xedh/dumpguard_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xedh/dumpguard_bof?label=&style=flat) | | [dcsync-bof](https://github.com/kozmer/dcsync-bof) | DCSync BOF implementation based on DCSyncer, mimikatz, and SharpKatz | ![](https://img.shields.io/github/stars/kozmer/dcsync-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/kozmer/dcsync-bof?label=&style=flat) | | [RelayInformer](https://github.com/zyn3rgy/RelayInformer) | Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective | ![](https://img.shields.io/github/stars/zyn3rgy/RelayInformer?label=&style=flat) | ![](https://img.shields.io/github/last-commit/zyn3rgy/RelayInformer?label=&style=flat) | | [the-one-wsl-bof](https://github.com/MayerDaniel/the-one-wsl-bof) | One WSL BOF to rule them all | ![](https://img.shields.io/github/stars/MayerDaniel/the-one-wsl-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/MayerDaniel/the-one-wsl-bof?label=&style=flat) | | [ESC1-unPAC](https://github.com/RayRRT/ESC1-unPAC) | A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+SID), PKINIT authentication, and NT hash extraction via UnPAC-the-hash. | ![](https://img.shields.io/github/stars/RayRRT/ESC1-unPAC?label=&style=flat) | ![](https://img.shields.io/github/last-commit/RayRRT/ESC1-unPAC?label=&style=flat) | | [ClipboardStealBOF](https://github.com/incursi0n/ClipboardStealBOF) | An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard history. | ![](https://img.shields.io/github/stars/incursi0n/ClipboardStealBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/incursi0n/ClipboardStealBOF?label=&style=flat) | | [cSessionHop](https://github.com/jhalon/cSessionHop) | Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM | ![](https://img.shields.io/github/stars/jhalon/cSessionHop?label=&style=flat) | ![](https://img.shields.io/github/last-commit/jhalon/cSessionHop?label=&style=flat) | | [inlineExecute](https://github.com/loland/inlineExecute) | Cobalt Strike BOF | ![](https://img.shields.io/github/stars/loland/inlineExecute?label=&style=flat) | ![](https://img.shields.io/github/last-commit/loland/inlineExecute?label=&style=flat) | | [portscanbof](https://github.com/fyxme/portscanbof) | A Port Scanning BOF (COFF) that replicates Cobalt Strike's Port Scanning functionality. Also includes a ping scanner. | ![](https://img.shields.io/github/stars/fyxme/portscanbof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/fyxme/portscanbof?label=&style=flat) | | [BOF-PE](https://github.com/NetSPI/BOF-PE) | An example reference design for a proposed BOF PE | ![](https://img.shields.io/github/stars/NetSPI/BOF-PE?label=&style=flat) | ![](https://img.shields.io/github/last-commit/NetSPI/BOF-PE?label=&style=flat) | | [Northwave BOF-PE](https://github.com/NorthwaveSecurity/BOF-PE) | Northwave's BOF-PE implementations. Notably, an improved ldapsearch BOF. | ![](https://img.shields.io/github/stars/NorthwaveSecurity/BOF-PE?label=&style=flat) | ![](https://img.shields.io/github/last-commit/NorthwaveSecurity/BOF-PE?label=&style=flat) | | [BOF_RunPe](https://github.com/NtDallas/BOF_RunPe) | BOF to run PE in Cobalt Strike Beacon without console creation | ![](https://img.shields.io/github/stars/NtDallas/BOF_RunPe?label=&style=flat) | ![](https://img.shields.io/github/last-commit/NtDallas/BOF_RunPe?label=&style=flat) | | [sw2-secinject](https://github.com/ScriptIdiot/sw2-secinject) | Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF | ![](https://img.shields.io/github/stars/ScriptIdiot/sw2-secinject?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ScriptIdiot/sw2-secinject?label=&style=flat) | | [teams-cookies-bof](https://github.com/TierZeroSecurity/teams-cookies-bof) | BOF to steal Teams cookies | ![](https://img.shields.io/github/stars/TierZeroSecurity/teams-cookies-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/TierZeroSecurity/teams-cookies-bof?label=&style=flat) | | [COMHijackBOF](https://github.com/mwnickerson/COMHijackBOF) | [No description provided] | ![](https://img.shields.io/github/stars/mwnickerson/COMHijackBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mwnickerson/COMHijackBOF?label=&style=flat) | | [Cryo](https://github.com/seraphimprotocol/Cryo) | Beacon Object File (BOF) that utilizes the Early Cryo Bird Injection technique in order to perform shellcode injection through frozen job objects. | ![](https://img.shields.io/github/stars/seraphimprotocol/Cryo?label=&style=flat) | ![](https://img.shields.io/github/last-commit/seraphimprotocol/Cryo?label=&style=flat) | | [CS-DriverQuery-BOF](https://github.com/0x73/CS-DriverQuery-BOF) | Cobalt Strike Beacon Object File to enumerate Windows system drivers via WMI | ![](https://img.shields.io/github/stars/0x73/CS-DriverQuery-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x73/CS-DriverQuery-BOF?label=&style=flat) | | [OC2-BOF-Collection](https://github.com/matsmi7h/OC2-BOF-Collection) | Collection of Beacon Object Files (BOFs) that are compatible with OC2 | ![](https://img.shields.io/github/stars/matsmi7h/OC2-BOF-Collection?label=&style=flat) | ![](https://img.shields.io/github/last-commit/matsmi7h/OC2-BOF-Collection?label=&style=flat) | | [BadTakeover-BOF](https://github.com/logangoins/BadTakeover-BOF) | Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover | ![](https://img.shields.io/github/stars/logangoins/BadTakeover-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/logangoins/BadTakeover-BOF?label=&style=flat) | | [ClearEventlogBOF](https://github.com/mertdas/ClearEventlogBOF) | Clear Event Logs | ![](https://img.shields.io/github/stars/mertdas/ClearEventlogBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mertdas/ClearEventlogBOF?label=&style=flat) | | [ChromeHistory_bof](https://github.com/mabangde/ChromeHistory_bof) | 获取chrome 浏览器记录 | ![](https://img.shields.io/github/stars/mabangde/ChromeHistory_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mabangde/ChromeHistory_bof?label=&style=flat) | | [SheepClone](https://github.com/RealRedTeam/SheepClone) | A BOF to stealthly dump LSASS | ![](https://img.shields.io/github/stars/RealRedTeam/SheepClone?label=&style=flat) | ![](https://img.shields.io/github/last-commit/RealRedTeam/SheepClone?label=&style=flat) | | [GhostKatz](https://github.com/RainbowDynamix/GhostKatz) | Dump LSASS via physical memory read primitives in vulnerable kernel drivers | ![](https://img.shields.io/github/stars/RainbowDynamix/GhostKatz?label=&style=flat) | ![](https://img.shields.io/github/last-commit/RainbowDynamix/GhostKatz?label=&style=flat) | | [BOFKatz](https://github.com/KrakenEU/BOFKatz) | Beacon Object File implementation of mimikatz leveraging the Process Hollowing technique | ![](https://img.shields.io/github/stars/KrakenEU/BOFKatz?label=&style=flat) | ![](https://img.shields.io/github/last-commit/KrakenEU/BOFKatz?label=&style=flat) | | [BOF_Spawn](https://github.com/NtDallas/BOF_Spawn) | Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames | ![](https://img.shields.io/github/stars/NtDallas/BOF_Spawn?label=&style=flat) | ![](https://img.shields.io/github/last-commit/NtDallas/BOF_Spawn?label=&style=flat) | | [WerDump](https://github.com/M1ndo/WerDump) | A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass | ![](https://img.shields.io/github/stars/M1ndo/WerDump?label=&style=flat) | ![](https://img.shields.io/github/last-commit/M1ndo/WerDump?label=&style=flat) | | [ClipboardHistoryThief-BOF](https://github.com/matsmi7h/ClipboardHistoryThief-BOF) | Beacon Object File (BOF) to extract all persistent clipboard history data from clipboard service process memory | ![](https://img.shields.io/github/stars/matsmi7h/ClipboardHistoryThief-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/matsmi7h/ClipboardHistoryThief-BOF?label=&style=flat) | | [ldap_bofs](https://github.com/garrettfoster13/ldap_bofs) | Random BOFs for LDAP tradecraft | ![](https://img.shields.io/github/stars/garrettfoster13/ldap_bofs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/garrettfoster13/ldap_bofs?label=&style=flat) | | [killerPID-BOF](https://github.com/TierZeroSecurity/killerPID-BOF) | BOF to terminate a process via PID as argument | ![](https://img.shields.io/github/stars/TierZeroSecurity/killerPID-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/TierZeroSecurity/killerPID-BOF?label=&style=flat) | | [SilentHarbor-BOF](https://github.com/ibaiC/SilentHarbor-BOF) | SafeHarbor revamped with Direct Syscalls using InlineWhispers3 | ![](https://img.shields.io/github/stars/ibaiC/SilentHarbor-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ibaiC/SilentHarbor-BOF?label=&style=flat) | | [PortscannerBOF](https://github.com/0xrobinso/PortscannerBOF) | Scan ports via Beacon Object File | ![](https://img.shields.io/github/stars/0xrobinso/PortscannerBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xrobinso/PortscannerBOF?label=&style=flat) | | [bring-your-own-host-bof](https://github.com/ohxeighty/bring-your-own-host-bof) | Fake "backed" .NET execution (ala xforcered's being a good CLR host) + BOF inline execution + Schizophrenic code quality | ![](https://img.shields.io/github/stars/ohxeighty/bring-your-own-host-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ohxeighty/bring-your-own-host-bof?label=&style=flat) | | [wambam-bof](https://github.com/grayhatkiller/wambam-bof) | [No description provided] | ![](https://img.shields.io/github/stars/grayhatkiller/wambam-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/grayhatkiller/wambam-bof?label=&style=flat) | | [TBRES-unprotect](https://github.com/sakkis91/TBRES-unprotect) | Cobalt Strike BOF to fetch tokens from Token Broker cache | ![](https://img.shields.io/github/stars/sakkis91/TBRES-unprotect?label=&style=flat) | ![](https://img.shields.io/github/last-commit/sakkis91/TBRES-unprotect?label=&style=flat) | | [cIdentifyServiceDependencies_BOF](https://github.com/EspressoCake/cIdentifyServiceDependencies_BOF) | Beacon Object File (BOF) for identifying dependent child services of a given parent. | ![](https://img.shields.io/github/stars/EspressoCake/cIdentifyServiceDependencies_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/cIdentifyServiceDependencies_BOF?label=&style=flat) | | [SafeHarbor-BOF](https://github.com/ibaiC/SafeHarbor-BOF) | Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintain stealth and robust OPSEC. | ![](https://img.shields.io/github/stars/ibaiC/SafeHarbor-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ibaiC/SafeHarbor-BOF?label=&style=flat) | | [com_d11](https://github.com/mannyfred/com_d11) | Direct3D 11 Screenshot BOF | ![](https://img.shields.io/github/stars/mannyfred/com_d11?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mannyfred/com_d11?label=&style=flat) | | [dnstool-bof](https://github.com/slemire/dnstool-bof) | BOF to manage Active Directory Integrated DNS (ADIDNS) | ![](https://img.shields.io/github/stars/slemire/dnstool-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/slemire/dnstool-bof?label=&style=flat) | | [blind](https://github.com/ZephrFish/blind) | A BOF for patching AMSI, ETW and NtTraceEvent aka Sysmon using Trampolines | ![](https://img.shields.io/github/stars/ZephrFish/blind?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ZephrFish/blind?label=&style=flat) | | [VulnDriverScan-BOF](https://github.com/0x3rhy/VulnDriverScan-BOF) | List local vulnerable driver services | ![](https://img.shields.io/github/stars/0x3rhy/VulnDriverScan-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/VulnDriverScan-BOF?label=&style=flat) | | [PrintSpoofer-BOF](https://github.com/SlimeOnSecurity/PrintSpoofer-BOF) | [No description provided] | ![](https://img.shields.io/github/stars/SlimeOnSecurity/PrintSpoofer-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/SlimeOnSecurity/PrintSpoofer-BOF?label=&style=flat) | | [LNKgenerator-BOF](https://github.com/KingOfTheNOPs/LNKgenerator-BOF) | BOF for creating LNKs | ![](https://img.shields.io/github/stars/KingOfTheNOPs/LNKgenerator-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/KingOfTheNOPs/LNKgenerator-BOF?label=&style=flat) | | [SigmaPotato-BOF](https://github.com/m4rvxpn/SigmaPotato-BOF) | SigmaPotato BOF Implementation | ![](https://img.shields.io/github/stars/m4rvxpn/SigmaPotato-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/m4rvxpn/SigmaPotato-BOF?label=&style=flat) | | [certdump](https://github.com/elephacking/certdump) | Beacon Object File (BOF) for dumping certificates (and, when possible, private keys) on Windows | ![](https://img.shields.io/github/stars/elephacking/certdump?label=&style=flat) | ![](https://img.shields.io/github/last-commit/elephacking/certdump?label=&style=flat) | | [BOF-APC-HOLLOW](https://github.com/le-jordon/BOF-APC-HOLLOW) | Update HOLLOW by boku for rwx memroy | ![](https://img.shields.io/github/stars/le-jordon/BOF-APC-HOLLOW?label=&style=flat) | ![](https://img.shields.io/github/last-commit/le-jordon/BOF-APC-HOLLOW?label=&style=flat) | | [cmstp_uac_bypass_bof](https://github.com/tehstoni/cmstp_uac_bypass_bof) | [No description provided] | ![](https://img.shields.io/github/stars/tehstoni/cmstp_uac_bypass_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/tehstoni/cmstp_uac_bypass_bof?label=&style=flat) | | [finduserhooks-bof](https://github.com/ostrichgolf/finduserhooks-bof) | FindUserHooks is a BOF used to discover user-land hooks placed by EDR solutions in all loaded modules. | ![](https://img.shields.io/github/stars/ostrichgolf/finduserhooks-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ostrichgolf/finduserhooks-bof?label=&style=flat) | | [WFPEnum](https://github.com/CUHKJason/WFPEnum) | Simple bof implementation to enumerate WFP filter and sublayer | ![](https://img.shields.io/github/stars/CUHKJason/WFPEnum?label=&style=flat) | ![](https://img.shields.io/github/last-commit/CUHKJason/WFPEnum?label=&style=flat) | | [EnableEFS](https://github.com/buldansec/EnableEFS) | Enable EFS service as low priv user (PE & BOF) | ![](https://img.shields.io/github/stars/buldansec/EnableEFS?label=&style=flat) | ![](https://img.shields.io/github/last-commit/buldansec/EnableEFS?label=&style=flat) | | [chrome-abe-decryption-bof](https://github.com/mendacus/chrome-abe-decryption-bof) | A Beacon Object File for decrypting Chrome App-Bound Encryption masterkeys in-memory via Cobalt Strike | ![](https://img.shields.io/github/stars/mendacus/chrome-abe-decryption-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mendacus/chrome-abe-decryption-bof?label=&style=flat) | | [theHandler BOF](https://github.com/ColeHouston/theHandler-BOF) | BOF to dump process memory with handle manipulation features using Bring Your Own Vulnerable Driver (BYOVD). | ![](https://img.shields.io/github/stars/ColeHouston/theHandler-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ColeHouston/theHandler-BOF?label=&style=flat) | | [Backstap](https://github.com/Fauzan-Aldi/Backstap) | Beacon Object File implementation of Yaxser's Backstab (Potential variant/fork). | ![](https://img.shields.io/github/stars/Fauzan-Aldi/Backstap?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Fauzan-Aldi/Backstap?label=&style=flat) | | [Enumeration-of-Buffer-Overflow-Protections](https://github.com/Fauzan-Aldi/Enumeration-of-Buffer-Overflow-Protections) | BOF to calculate system processes and identify their respective protection levels. | ![](https://img.shields.io/github/stars/Fauzan-Aldi/Enumeration-of-Buffer-Overflow-Protections?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Fauzan-Aldi/Enumeration-of-Buffer-Overflow-Protections?label=&style=flat) | | [BofRoast](https://github.com/cube0x0/BofRoast) | BOFs for roasting Kerberos tickets in AD environments | ![](https://img.shields.io/github/stars/cube0x0/BofRoast?label=&style=flat) | ![](https://img.shields.io/github/last-commit/cube0x0/BofRoast?label=&style=flat) | | [BOFs](https://github.com/rookuu/BOFs) | MiniDumpWriteDump BOF | ![](https://img.shields.io/github/stars/rookuu/BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/rookuu/BOFs?label=&style=flat) | | [nanodump](https://github.com/fortra/nanodump) | Dump LSASS memory without touching disk or spawning a new process | ![](https://img.shields.io/github/stars/fortra/nanodump?label=&style=flat) | ![](https://img.shields.io/github/last-commit/fortra/nanodump?label=&style=flat) | | [No-Consolation](https://github.com/fortra/No-Consolation) | Executes unmanaged PEs inline without allocating a console window or spawning conhost.exe | ![](https://img.shields.io/github/stars/fortra/No-Consolation?label=&style=flat) | ![](https://img.shields.io/github/last-commit/fortra/No-Consolation?label=&style=flat) | | [CredManBOF](https://github.com/jsecu/CredManBOF) | Dumps saved credentials from Windows Credential Manager | ![](https://img.shields.io/github/stars/jsecu/CredManBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/jsecu/CredManBOF?label=&style=flat) | | [PPLDump_BOF](https://github.com/EspressoCake/PPLDump_BOF) | Dump memory from Protected Processes like LSASS by bypassing PPL protection | ![](https://img.shields.io/github/stars/EspressoCake/PPLDump_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/PPLDump_BOF?label=&style=flat) | | [NoteThief](https://github.com/trainr3kt/NoteThief) | Recover unsaved Notepad data from memory | ![](https://img.shields.io/github/stars/trainr3kt/NoteThief?label=&style=flat) | ![](https://img.shields.io/github/last-commit/trainr3kt/NoteThief?label=&style=flat) | | [Cookie-Monster-BOF](https://github.com/KingOfTheNOPs/cookie-monster) | Steal browser cookies for edge, chrome and firefox through a BOF! | ![](https://img.shields.io/github/stars/KingOfTheNOPs/cookie-monster?label=&style=flat) | ![](https://img.shields.io/github/last-commit/KingOfTheNOPs/cookie-monster?label=&style=flat) | | [SharpHunter](https://github.com/lintstar/SharpHunter) | Automated host information hunting tool for Windows | ![](https://img.shields.io/github/stars/lintstar/SharpHunter?label=&style=flat) | ![](https://img.shields.io/github/last-commit/lintstar/SharpHunter?label=&style=flat) | | [ScreenshotBOF](https://github.com/CodeXTF2/ScreenshotBOF) | Takes in-memory screenshots using WinAPI without fork & run | ![](https://img.shields.io/github/stars/CodeXTF2/ScreenshotBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/CodeXTF2/ScreenshotBOF?label=&style=flat) | | [checkUAC-BOF](https://github.com/cl4ym0re/checkUAC-BOF) | BOF to check UAC status before bypassing it | ![](https://img.shields.io/github/stars/cl4ym0re/checkUAC-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/cl4ym0re/checkUAC-BOF?label=&style=flat) | | [InlineExecuteEx](https://github.com/0xTriboulet/InlineExecuteEx) | A BOF that's a BOF Loader. Implements COFFLoader in Cobalt Strike | ![](https://img.shields.io/github/stars/0xTriboulet/InlineExecuteEx?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xTriboulet/InlineExecuteEx?label=&style=flat) | | [Inline-EA](https://github.com/EricEsquivel/Inline-EA) | BOF for evasive .NET assembly execution | ![](https://img.shields.io/github/stars/EricEsquivel/Inline-EA?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EricEsquivel/Inline-EA?label=&style=flat) | | [cli4bofs](https://github.com/The-Z-Labs/cli4bofs) | Command-line interface for running BOFs | ![](https://img.shields.io/github/stars/The-Z-Labs/cli4bofs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/The-Z-Labs/cli4bofs?label=&style=flat) | | [WebcamBOF](https://github.com/CodeXTF2/WebcamBOF) | Capture webcam images and stream them back via memory | ![](https://img.shields.io/github/stars/CodeXTF2/WebcamBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/CodeXTF2/WebcamBOF?label=&style=flat) | | [Inline-Run-PE](https://github.com/7uckzero/Inline-Run-PE) | Inject unmanaged PE into Beacon's memory and run it | ![](https://img.shields.io/github/stars/7uckzero/Inline-Run-PE?label=&style=flat) | ![](https://img.shields.io/github/last-commit/7uckzero/Inline-Run-PE?label=&style=flat) | | [Example-BOF](https://github.com/blakefle/Example-BOF) | BOF using MiniDumpWriteDump to dump LSASS memory | ![](https://img.shields.io/github/stars/blakefle/Example-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/blakefle/Example-BOF?label=&style=flat) | | [WindowSpy](https://github.com/CodeXTF2/WindowSpy) | Targeted surveillance via active window capture and beaconing | ![](https://img.shields.io/github/stars/CodeXTF2/WindowSpy?label=&style=flat) | ![](https://img.shields.io/github/last-commit/CodeXTF2/WindowSpy?label=&style=flat) | | [Draugr](https://github.com/NtDallas/Draugr) | BOF using synthetic stackframes | ![](https://img.shields.io/github/stars/NtDallas/Draugr?label=&style=flat) | ![](https://img.shields.io/github/last-commit/NtDallas/Draugr?label=&style=flat) | | [ADSIsearch](https://github.com/EricEsquivel/ADSIsearch) | Query Active Directory using ADSI and NetMgmt APIs via BOF | ![](https://img.shields.io/github/stars/EricEsquivel/ADSIsearch?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EricEsquivel/ADSIsearch?label=&style=flat) | | [SignalKeyBOF](https://github.com/0xRedpoll/SignalKeyBOF) | BOF to decrypt Signal Desktop chat logs | ![](https://img.shields.io/github/stars/0xRedpoll/SignalKeyBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xRedpoll/SignalKeyBOF?label=&style=flat) | | [patchwerk](https://github.com/boku7/patchwerk) | BOF that overwrites Nt* syscall stubs with clean versions (hook evasion) | ![](https://img.shields.io/github/stars/boku7/patchwerk?label=&style=flat) | ![](https://img.shields.io/github/last-commit/boku7/patchwerk?label=&style=flat) | | [enumpwshhistbof](https://github.com/fyxme/enumpwshhistbof) | Enumerates PowerShell history for sensitive info using BOF | ![](https://img.shields.io/github/stars/fyxme/enumpwshhistbof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/fyxme/enumpwshhistbof?label=&style=flat) | | [bof-winrm-plugin-jump](https://github.com/FalconForceTeam/bof-winrm-plugin-jump) | Plugin BOF for WinRM lateral movement | ![](https://img.shields.io/github/stars/FalconForceTeam/bof-winrm-plugin-jump?label=&style=flat) | ![](https://img.shields.io/github/last-commit/FalconForceTeam/bof-winrm-plugin-jump?label=&style=flat) | | [BOF-Timestomp](https://github.com/BKLockly/BOF-Timestomp) | Modify file timestamps with BOF | ![](https://img.shields.io/github/stars/BKLockly/BOF-Timestomp?label=&style=flat) | ![](https://img.shields.io/github/last-commit/BKLockly/BOF-Timestomp?label=&style=flat) | | [Spoof-Execute_Bof](https://github.com/0x3rhy/Spoof-Execute_Bof) | PPID spoofing execution via BOF | ![](https://img.shields.io/github/stars/0x3rhy/Spoof-Execute_Bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/Spoof-Execute_Bof?label=&style=flat) | | [Get-NetNTLM](https://github.com/KingOfTheNOPs/Get-NetNTLM) | Internal Monologue technique implemented as a BOF | ![](https://img.shields.io/github/stars/KingOfTheNOPs/Get-NetNTLM?label=&style=flat) | ![](https://img.shields.io/github/last-commit/KingOfTheNOPs/Get-NetNTLM?label=&style=flat) | | [EDRSilencerBOF](https://github.com/0x3rhy/EDRSilencerBOF) | Silences EDR hooks using BOF-based techniques | ![](https://img.shields.io/github/stars/0x3rhy/EDRSilencerBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/EDRSilencerBOF?label=&style=flat) | | [bof-minimal_win_x64](https://github.com/The-Z-Labs/bof-minimal_win_x64) | Minimal Win64 BOF using bof-launcher | ![](https://img.shields.io/github/stars/The-Z-Labs/bof-minimal_win_x64?label=&style=flat) | ![](https://img.shields.io/github/last-commit/The-Z-Labs/bof-minimal_win_x64?label=&style=flat) | | [getlapsbof](https://github.com/Savsanta/getlapsbof) | Cobalt Strike BOF to retrieve and decrypt Microsoft Windows LAPS V2 or Microsoft Entra/AzureAD LAPS passwords | ![](https://img.shields.io/github/stars/Savsanta/getlapsbof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Savsanta/getlapsbof?label=&style=flat) | | [filehashbof](https://github.com/SavSanta/filehashbof) | Perform hashing (MD5/SHA1/SHA256) with Win32 API via BOF | ![](https://img.shields.io/github/stars/SavSanta/filehashbof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/SavSanta/filehashbof?label=&style=flat) | | [PersisTask-BOF](https://github.com/nickzer0/PersisTask-BOF) | Create scheduled tasks using COM objects via BOF | ![](https://img.shields.io/github/stars/nickzer0/PersisTask-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/nickzer0/PersisTask-BOF?label=&style=flat) | | [Enumprotections_BOF](https://github.com/Octoberfest7/Enumprotections_BOF) | Enumerate system protection levels with BOF | ![](https://img.shields.io/github/stars/Octoberfest7/Enumprotections_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Octoberfest7/Enumprotections_BOF?label=&style=flat) | | [smbtakeover](https://github.com/zyn3rgy/smbtakeover) | Unbind port 445 on Windows using BOF and Python3 | ![](https://img.shields.io/github/stars/zyn3rgy/smbtakeover?label=&style=flat) | ![](https://img.shields.io/github/last-commit/zyn3rgy/smbtakeover?label=&style=flat) | | [CopyUnlocker-BOF](https://github.com/AonCyberLabs/CopyUnlocker-BOF) | Port of GhostPack's LockLess tool to a Beacon Object File | ![](https://img.shields.io/github/stars/AonCyberLabs/CopyUnlocker-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/AonCyberLabs/CopyUnlocker-BOF?label=&style=flat) | | [EDRSilencer-BOF](https://github.com/AonCyberLabs/EDRSilencer-BOF) | Port of the EDRSilencer tool to BOF format | ![](https://img.shields.io/github/stars/AonCyberLabs/EDRSilencer-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/AonCyberLabs/EDRSilencer-BOF?label=&style=flat) | | [BOF.NET (fork)](https://github.com/williamknows/BOF.NET) | A .NET Runtime for Cobalt Strike's Beacon Object Files (forked from CCob) | ![](https://img.shields.io/github/stars/williamknows/BOF.NET?label=&style=flat) | ![](https://img.shields.io/github/last-commit/williamknows/BOF.NET?label=&style=flat) | | [EDREnum-BOF](https://github.com/mlcsec/EDREnum-BOF) | Identify common EDR processes, directories, and services (Invoke-EDRChecker as BOF) | ![](https://img.shields.io/github/stars/mlcsec/EDREnum-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mlcsec/EDREnum-BOF?label=&style=flat) | | [sleepmask-vs](https://github.com/Cobalt-Strike/sleepmask-vs) | A simple Sleepmask BOF example | ![](https://img.shields.io/github/stars/Cobalt-Strike/sleepmask-vs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Cobalt-Strike/sleepmask-vs?label=&style=flat) | | [enumhandles_BOF](https://github.com/Octoberfest7/enumhandles_BOF) | Enumerate open handles using a BOF | ![](https://img.shields.io/github/stars/Octoberfest7/enumhandles_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Octoberfest7/enumhandles_BOF?label=&style=flat) | | [NtDumpBOF](https://github.com/deh00ni/NtDumpBOF) | Dump NT objects using BOF | ![](https://img.shields.io/github/stars/deh00ni/NtDumpBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/deh00ni/NtDumpBOF?label=&style=flat) | | [Toggle_Token_Privileges_BOF](https://github.com/EspressoCake/Toggle_Token_Privileges_BOF) | Syscall BOF to modify process token privileges | ![](https://img.shields.io/github/stars/EspressoCake/Toggle_Token_Privileges_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/Toggle_Token_Privileges_BOF?label=&style=flat) | | [CVE-2024-26229-BOF](https://github.com/apkc/CVE-2024-26229-BOF) | BOF implementations for CVE-2024-26229 in CS and BruteRatel | ![](https://img.shields.io/github/stars/apkc/CVE-2024-26229-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/apkc/CVE-2024-26229-BOF?label=&style=flat) | | [BOF_Beginner](https://github.com/b4rth0v5k1/BOF_Beginner) | Beginner introduction to Cobalt Strike BOF development | ![](https://img.shields.io/github/stars/b4rth0v5k1/BOF_Beginner?label=&style=flat) | ![](https://img.shields.io/github/last-commit/b4rth0v5k1/BOF_Beginner?label=&style=flat) | | [Cookie-and-Handle-Stealer](https://github.com/Mr-Un1k0d3r/Cookie-and-Handle-Stealer) | Extract WebKit master key and decrypt cookies using BOF | ![](https://img.shields.io/github/stars/Mr-Un1k0d3r/Cookie-and-Handle-Stealer?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Mr-Un1k0d3r/Cookie-and-Handle-Stealer?label=&style=flat) | | [ADSyncDump-BOF](https://github.com/Paradoxis/ADSyncDump-BOF) | A port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencies. | ![](https://img.shields.io/github/stars/Paradoxis/ADSyncDump-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Paradoxis/ADSyncDump-BOF?label=&style=flat) | | [BOF-entra-authcode-flow](https://github.com/sudonoodle/BOF-entra-authcode-flow) | Beacon Object File (BOF) to obtain AzureAD/Microsoft Entra tokens via authcode flow. | ![](https://img.shields.io/github/stars/sudonoodle/BOF-entra-authcode-flow?label=&style=flat) | ![](https://img.shields.io/github/last-commit/sudonoodle/BOF-entra-authcode-flow?label=&style=flat) | | [aad_prt_bof](https://github.com/wotwot563/aad_prt_bof) | Azure PRT token interaction via BOF | ![](https://img.shields.io/github/stars/wotwot563/aad_prt_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/wotwot563/aad_prt_bof?label=&style=flat) | | [append_BOF](https://github.com/carlnykvist/append_BOF) | BOF to append text to a file | ![](https://img.shields.io/github/stars/carlnykvist/append_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/carlnykvist/append_BOF?label=&style=flat) | | [ASRenum-BOF](https://github.com/mlcsec/ASRenum-BOF) | Identify ASR rules, actions, and exclusion locations via BOF | ![](https://img.shields.io/github/stars/mlcsec/ASRenum-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mlcsec/ASRenum-BOF?label=&style=flat) | | [bofhound](https://github.com/fortalice/bofhound) | Generate BloodHound-compatible JSON from ldapsearch logs | ![](https://img.shields.io/github/stars/fortalice/bofhound?label=&style=flat) | ![](https://img.shields.io/github/last-commit/fortalice/bofhound?label=&style=flat) | | [rust_bof](https://github.com/wumb0/rust_bof) | Cobalt Strike BOFs written in Rust using core and alloc crates | ![](https://img.shields.io/github/stars/wumb0/rust_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/wumb0/rust_bof?label=&style=flat) | | [ThreadlessInject-BOF](https://github.com/iilegacyyii/ThreadlessInject-BOF) | Threadless process injection BOF based on @_EthicalChaos_ research | ![](https://img.shields.io/github/stars/iilegacyyii/ThreadlessInject-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/iilegacyyii/ThreadlessInject-BOF?label=&style=flat) | | [PoolPartyBof](https://github.com/0xEr3bus/PoolPartyBof) | BOF implementation of PoolParty injection technique | ![](https://img.shields.io/github/stars/0xEr3bus/PoolPartyBof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xEr3bus/PoolPartyBof?label=&style=flat) | | [BOF-enumfiles](https://github.com/wsummerhill/BOF-enumfiles) | C++ BOF to enumerate file types useful for post-exploitation | ![](https://img.shields.io/github/stars/wsummerhill/BOF-enumfiles?label=&style=flat) | ![](https://img.shields.io/github/last-commit/wsummerhill/BOF-enumfiles?label=&style=flat) | | [MemReader_BoF](https://github.com/trainr3kt/MemReader_BoF) | BOF for reading memory regions of processes | ![](https://img.shields.io/github/stars/trainr3kt/MemReader_BoF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/trainr3kt/MemReader_BoF?label=&style=flat) | | [bleWebDAVClient-BOF](https://github.com/KingOfTheNOPs/EnableWebDAVClient-BOF) | Enable WebDAV client service via BOF on x64 Windows | ![](https://img.shields.io/github/stars/KingOfTheNOPs/EnableWebDAVClient-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/KingOfTheNOPs/EnableWebDAVClient-BOF?label=&style=flat) | | [CS-auto_inject-BOF](https://github.com/0x73/CS-auto_inject-BOF) | Auto-inject BOF into target processes unattended | ![](https://img.shields.io/github/stars/0x73/CS-auto_inject-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x73/CS-auto_inject-BOF?label=&style=flat) | | [ThreadlessInject_BOF](https://github.com/ewby/ThreadlessInject_BOF) | WIP port of ThreadlessInject technique to BOF | ![](https://img.shields.io/github/stars/ewby/ThreadlessInject_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ewby/ThreadlessInject_BOF?label=&style=flat) | | [blackout-reloaded](https://github.com/tijme/blackout-reloaded) | BOF to kill anti-malware-protected processes via vulnerable driver | ![](https://img.shields.io/github/stars/tijme/blackout-reloaded?label=&style=flat) | ![](https://img.shields.io/github/last-commit/tijme/blackout-reloaded?label=&style=flat) | | [InlineExecute-Assembly](https://github.com/anthemtotheego/InlineExecute-Assembly) | Execute .NET assemblies inline using BOF instead of fork&run | ![](https://img.shields.io/github/stars/anthemtotheego/InlineExecute-Assembly?label=&style=flat) | ![](https://img.shields.io/github/last-commit/anthemtotheego/InlineExecute-Assembly?label=&style=flat) | | [pybof](https://github.com/rkbennett/pybof) | Python wrapper module to execute BOFs | ![](https://img.shields.io/github/stars/rkbennett/pybof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/rkbennett/pybof?label=&style=flat) | | [nanorobeus](https://github.com/wavvs/nanorobeus) | BOF for Kerberos ticket management | ![](https://img.shields.io/github/stars/wavvs/nanorobeus?label=&style=flat) | ![](https://img.shields.io/github/last-commit/wavvs/nanorobeus?label=&style=flat) | | [SelfDel-BOF](https://github.com/seventeenman/SelfDel-BOF) | Delete files even when handles are open using SetFileInformationByHandle | ![](https://img.shields.io/github/stars/seventeenman/SelfDel-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/seventeenman/SelfDel-BOF?label=&style=flat) | | [Defender_Exclusions-BOF](https://github.com/EspressoCake/Defender_Exclusions-BOF) | Query current Windows Defender exclusions via BOF | ![](https://img.shields.io/github/stars/EspressoCake/Defender_Exclusions-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/Defender_Exclusions-BOF?label=&style=flat) | | [AddDefenderExclusions-BOF](https://github.com/Like0x/AddDefenderExclusions-BOF) | BOF to add exclusions to Windows Defender | ![](https://img.shields.io/github/stars/Like0x/AddDefenderExclusions-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Like0x/AddDefenderExclusions-BOF?label=&style=flat) | | [DropSpawn_BOF](https://github.com/Octoberfest7/DropSpawn_BOF) | Use DLL hijacking to spawn new Beacon sessions via BOF | ![](https://img.shields.io/github/stars/Octoberfest7/DropSpawn_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Octoberfest7/DropSpawn_BOF?label=&style=flat) | | [ScreenshotBOFPlus](https://github.com/baiyies/ScreenshotBOFPlus) | Take screenshots without injection via BOF | ![](https://img.shields.io/github/stars/baiyies/ScreenshotBOFPlus?label=&style=flat) | ![](https://img.shields.io/github/last-commit/baiyies/ScreenshotBOFPlus?label=&style=flat) | | [PPLFaultDumpBOF](https://github.com/trustedsec/PPLFaultDumpBOF) | Dump LSASS from PPL-protected processes using BOF | ![](https://img.shields.io/github/stars/trustedsec/PPLFaultDumpBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/trustedsec/PPLFaultDumpBOF?label=&style=flat) | | [kernel-mii](https://github.com/tijme/kernel-mii) | BOF foundation for kernel exploitation using CVE-2021-21551 | ![](https://img.shields.io/github/stars/tijme/kernel-mii?label=&style=flat) | ![](https://img.shields.io/github/last-commit/tijme/kernel-mii?label=&style=flat) | | [BOF-RunPE](https://github.com/MrAle98/BOF-RunPE) | BOF to load and run unmanaged PE files from memory | ![](https://img.shields.io/github/stars/MrAle98/BOF-RunPE?label=&style=flat) | ![](https://img.shields.io/github/last-commit/MrAle98/BOF-RunPE?label=&style=flat) | | [SharpHound4Cobalt](https://github.com/Hypnoze57/SharpHound4Cobalt) | C# collector for BloodHound adapted for BOF.NET use | ![](https://img.shields.io/github/stars/Hypnoze57/SharpHound4Cobalt?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Hypnoze57/SharpHound4Cobalt?label=&style=flat) | | [Elevate-System-Trusted-BOF](https://github.com/Mr-Un1k0d3r/Elevate-System-Trusted-BOF) | Privilege escalation via trusted system token using BOF | ![](https://img.shields.io/github/stars/Mr-Un1k0d3r/Elevate-System-Trusted-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Mr-Un1k0d3r/Elevate-System-Trusted-BOF?label=&style=flat) | | [KDStab](https://github.com/Octoberfest7/KDStab) | Combine KillDefender and Backstab as a stealthy BOF | ![](https://img.shields.io/github/stars/Octoberfest7/KDStab?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Octoberfest7/KDStab?label=&style=flat) | | [Quser-BOF](https://github.com/netero1010/Quser-BOF) | Implements quser.exe functionality via WinAPI and BOF | ![](https://img.shields.io/github/stars/netero1010/Quser-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/netero1010/Quser-BOF?label=&style=flat) | | [whereami](https://github.com/boku7/whereami) | Uses handwritten shelcode to return environment strings without touching any DLLs | ![](https://img.shields.io/github/stars/boku7/whereami?label=&style=flat) | ![](https://img.shields.io/github/last-commit/boku7/whereami?label=&style=flat) | | [halosgate-ps](https://github.com/boku7/halosgate-ps) | Uses custom ASM HalosGate & HellsGate syscaller to list processes | ![](https://img.shields.io/github/stars/boku7/halosgate-ps?label=&style=flat) | ![](https://img.shields.io/github/last-commit/boku7/halosgate-ps?label=&style=flat) | | [injectAmsiBypass](https://github.com/boku7/injectAmsiBypass) | Bypass AMSI in a remote process with BOF-based code injection | ![](https://img.shields.io/github/stars/boku7/injectAmsiBypass?label=&style=flat) | ![](https://img.shields.io/github/last-commit/boku7/injectAmsiBypass?label=&style=flat) | | [spawn](https://github.com/boku7/spawn) | Spawn sacrificial process, inject shellcode, and evade hooks | ![](https://img.shields.io/github/stars/boku7/spawn?label=&style=flat) | ![](https://img.shields.io/github/last-commit/boku7/spawn?label=&style=flat) | | [xPipe](https://github.com/boku7/xPipe) | List Windows named pipes and return ownership/DACL info | ![](https://img.shields.io/github/stars/boku7/xPipe?label=&style=flat) | ![](https://img.shields.io/github/last-commit/boku7/xPipe?label=&style=flat) | | [HOLLOW](https://github.com/boku7/HOLLOW) | EarlyBird process hollowing technique implemented in BOF | ![](https://img.shields.io/github/stars/boku7/HOLLOW?label=&style=flat) | ![](https://img.shields.io/github/last-commit/boku7/HOLLOW?label=&style=flat) | | [DumpThatLSASS-Bof](https://github.com/0x3rhy/DumpThatLSASS-Bof) | Patch ETW and dump LSASS memory | ![](https://img.shields.io/github/stars/0x3rhy/DumpThatLSASS-Bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/DumpThatLSASS-Bof?label=&style=flat) | | [PersistBOF](https://github.com/N4kedTurtle/PersistBOF) | Automate common persistence techniques using BOF | ![](https://img.shields.io/github/stars/N4kedTurtle/PersistBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/N4kedTurtle/PersistBOF?label=&style=flat) | | [cobaltstrike-cat-bof](https://github.com/tvgdb/cobaltstrike-cat-bof) | BOF implementation of the Unix cat command | ![](https://img.shields.io/github/stars/tvgdb/cobaltstrike-cat-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/tvgdb/cobaltstrike-cat-bof?label=&style=flat) | | [adduserbysamr-bof](https://github.com/AgeloVito/adduserbysamr-bof) | Add user to local group via SAMR API using BOF | ![](https://img.shields.io/github/stars/AgeloVito/adduserbysamr-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/AgeloVito/adduserbysamr-bof?label=&style=flat) | | [BOF-CredUI](https://github.com/Hagrid29/BOF-CredUI) | Invoke Windows credential prompt using CredUIPromptForWindowsCredentials | ![](https://img.shields.io/github/stars/Hagrid29/BOF-CredUI?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Hagrid29/BOF-CredUI?label=&style=flat) | | [AddUser-Bof](https://github.com/0x3rhy/AddUser-Bof) | Add a local admin user using BOF | ![](https://img.shields.io/github/stars/0x3rhy/AddUser-Bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/AddUser-Bof?label=&style=flat) | | [cmstplua-uac-bypass](https://github.com/tijme/cmstplua-uac-bypass) | Bypass UAC via CMSTPLUA COM interface using BOF | ![](https://img.shields.io/github/stars/tijme/cmstplua-uac-bypass?label=&style=flat) | ![](https://img.shields.io/github/last-commit/tijme/cmstplua-uac-bypass?label=&style=flat) | | [BOF-patchit](https://github.com/ScriptIdiot/BOF-patchit) | Patch AMSI/ETW in memory for x64 processes using BOF | ![](https://img.shields.io/github/stars/ScriptIdiot/BOF-patchit?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ScriptIdiot/BOF-patchit?label=&style=flat) | | [ClipboardWindow-Inject](https://github.com/BronzeTicket/ClipboardWindow-Inject) | Process injection via CLIPBRDWNDCLASS BOF | ![](https://img.shields.io/github/stars/BronzeTicket/ClipboardWindow-Inject?label=&style=flat) | ![](https://img.shields.io/github/last-commit/BronzeTicket/ClipboardWindow-Inject?label=&style=flat) | | [cs-token-vault](https://github.com/Henkru/cs-token-vault) | In-memory token vault implemented in BOF | ![](https://img.shields.io/github/stars/Henkru/cs-token-vault?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Henkru/cs-token-vault?label=&style=flat) | | [EventViewerBypassUacBof](https://github.com/Libraggbond/EventViewerBypassUacBof) | Bypass UAC using EventViewer via BOF | ![](https://img.shields.io/github/stars/Libraggbond/EventViewerBypassUacBof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Libraggbond/EventViewerBypassUacBof?label=&style=flat) | | [BOF-Nim](https://github.com/byt3bl33d3r/BOF-Nim) | Beacon Object Files written in Nim | ![](https://img.shields.io/github/stars/byt3bl33d3r/BOF-Nim?label=&style=flat) | ![](https://img.shields.io/github/last-commit/byt3bl33d3r/BOF-Nim?label=&style=flat) | | [BOF-Zig](https://github.com/byt3bl33d3r/BOF-Zig) | Beacon Object Files written in Zig | ![](https://img.shields.io/github/stars/byt3bl33d3r/BOF-Zig?label=&style=flat) | ![](https://img.shields.io/github/last-commit/byt3bl33d3r/BOF-Zig?label=&style=flat) | | [RDPHijack-BOF](https://github.com/netero1010/RDPHijack-BOF) | Hijack local/remote RDP sessions using WinStationConnect API | ![](https://img.shields.io/github/stars/netero1010/RDPHijack-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/netero1010/RDPHijack-BOF?label=&style=flat) | | [KillDefender_BOF](https://github.com/Octoberfest7/KillDefender_BOF) | BOF implementation of pwn1sher's KillDefender | ![](https://img.shields.io/github/stars/Octoberfest7/KillDefender_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Octoberfest7/KillDefender_BOF?label=&style=flat) | | [Readfile_BoF](https://github.com/trainr3kt/Readfile_BoF) | Simple BOF to read file content | ![](https://img.shields.io/github/stars/trainr3kt/Readfile_BoF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/trainr3kt/Readfile_BoF?label=&style=flat) | | [freeBokuLoader](https://github.com/S4ntiagoP/freeBokuLoader) | Simple BOF that frees user data runtime libraries (UDRLs) | ![](https://img.shields.io/github/stars/S4ntiagoP/freeBokuLoader?label=&style=flat) | ![](https://img.shields.io/github/last-commit/S4ntiagoP/freeBokuLoader?label=&style=flat) | | [SysWhispers2BOF](https://github.com/FalconForceTeam/SysWhispers2BOF) | Script to use SysWhispers2 from within Cobalt Strike BOFs | ![](https://img.shields.io/github/stars/FalconForceTeam/SysWhispers2BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/FalconForceTeam/SysWhispers2BOF?label=&style=flat) | | [JumpSession_BOF](https://github.com/Octoberfest7/JumpSession_BOF) | Create Beacon sessions in different user sessions | ![](https://img.shields.io/github/stars/Octoberfest7/JumpSession_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Octoberfest7/JumpSession_BOF?label=&style=flat) | | [EventViewerUAC_BOF](https://github.com/Octoberfest7/EventViewerUAC_BOF) | UAC bypass using Event Viewer deserialization | ![](https://img.shields.io/github/stars/Octoberfest7/EventViewerUAC_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Octoberfest7/EventViewerUAC_BOF?label=&style=flat) | | [DelegationBOF](https://github.com/Crypt0s/DelegationBOF) | BOF for Kerberos delegation abuse | ![](https://img.shields.io/github/stars/Crypt0s/DelegationBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Crypt0s/DelegationBOF?label=&style=flat) | | [bof_helper](https://github.com/dtmsecurity/bof_helper) | Helper framework for building Cobalt Strike BOFs | ![](https://img.shields.io/github/stars/dtmsecurity/bof_helper?label=&style=flat) | ![](https://img.shields.io/github/last-commit/dtmsecurity/bof_helper?label=&style=flat) | | [ZeroLogon-BOF](https://github.com/rsmudge/ZeroLogon-BOF) | Exploitation of ZeroLogon via BOF | ![](https://img.shields.io/github/stars/rsmudge/ZeroLogon-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/rsmudge/ZeroLogon-BOF?label=&style=flat) | | [unhook-bof](https://github.com/Cobalt-Strike/unhook-bof) | Remove API hooks from Beacon process | ![](https://img.shields.io/github/stars/Cobalt-Strike/unhook-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Cobalt-Strike/unhook-bof?label=&style=flat) | | [Backstab_BOF](https://github.com/Octoberfest7/Backstab_BOF) | Implementation of Yaxser’s Backstab as a BOF | ![](https://img.shields.io/github/stars/Octoberfest7/Backstab_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Octoberfest7/Backstab_BOF?label=&style=flat) | | [ServiceMove-BOF](https://github.com/netero1010/ServiceMove-BOF) | Lateral movement via DLL hijacking in Windows Perception Simulation Service | ![](https://img.shields.io/github/stars/netero1010/ServiceMove-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/netero1010/ServiceMove-BOF?label=&style=flat) | | [KillDefenderBOF (fork)](https://github.com/redteam88/KillDefenderBOF) | Forked PoC of KillDefender as a BOF | ![](https://img.shields.io/github/stars/redteam88/KillDefenderBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/redteam88/KillDefenderBOF?label=&style=flat) | | [secinject](https://github.com/apokryptein/secinject) | Section mapping injection via BOF | ![](https://img.shields.io/github/stars/apokryptein/secinject?label=&style=flat) | ![](https://img.shields.io/github/last-commit/apokryptein/secinject?label=&style=flat) | | [tgtdelegation](https://github.com/connormcgarr/tgtdelegation) | Get usable TGT via TGT delegation trick using BOF | ![](https://img.shields.io/github/stars/connormcgarr/tgtdelegation?label=&style=flat) | ![](https://img.shields.io/github/last-commit/connormcgarr/tgtdelegation?label=&style=flat) | | [DLL_Version_Enumeration_BOF](https://github.com/EspressoCake/DLL_Version_Enumeration_BOF) | Enumerate version info for DLLs associated with Beacon process | ![](https://img.shields.io/github/stars/EspressoCake/DLL_Version_Enumeration_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/DLL_Version_Enumeration_BOF?label=&style=flat) | | [InlineWhispers](https://github.com/outflanknl/InlineWhispers) | Direct System Call support in Cobalt Strike BOFs | ![](https://img.shields.io/github/stars/outflanknl/InlineWhispers?label=&style=flat) | ![](https://img.shields.io/github/last-commit/outflanknl/InlineWhispers?label=&style=flat) | | [DLL-Exports-Extraction-BOF](https://github.com/EspressoCake/DLL-Exports-Extraction-BOF) | Extract DLL export symbols with NTFS transaction support | ![](https://img.shields.io/github/stars/EspressoCake/DLL-Exports-Extraction-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/DLL-Exports-Extraction-BOF?label=&style=flat) | | [DLL-Hijack-Search-Order-BOF](https://github.com/EspressoCake/DLL-Hijack-Search-Order-BOF) | BOF for enumerating DLL hijack search order | ![](https://img.shields.io/github/stars/EspressoCake/DLL-Hijack-Search-Order-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/DLL-Hijack-Search-Order-BOF?label=&style=flat) | | [DLL_Imports_BOF](https://github.com/EspressoCake/DLL_Imports_BOF) | Parse PE file imports via BOF and extract DLL symbols | ![](https://img.shields.io/github/stars/EspressoCake/DLL_Imports_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/DLL_Imports_BOF?label=&style=flat) | | [HandleKatz_BOF](https://github.com/EspressoCake/HandleKatz_BOF) | BOF port of research by @thefLinkk and @codewhitesec for LSASS credential dumping | ![](https://img.shields.io/github/stars/EspressoCake/HandleKatz_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/HandleKatz_BOF?label=&style=flat) | | [Firewall_Walker_BOF](https://github.com/EspressoCake/Firewall_Walker_BOF) | BOF for interacting with Windows software firewall COM objects | ![](https://img.shields.io/github/stars/EspressoCake/Firewall_Walker_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/Firewall_Walker_BOF?label=&style=flat) | | [Self_Deletion_BOF](https://github.com/EspressoCake/Self_Deletion_BOF) | Self-deletion BOF based on research by @jonasLyk and @LloydLabs | ![](https://img.shields.io/github/stars/EspressoCake/Self_Deletion_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/Self_Deletion_BOF?label=&style=flat) | | [injectEtwBypass](https://github.com/boku7/injectEtwBypass) | Inject ETW Bypass into a remote process using syscalls (HellsGate/HalosGate) | ![](https://img.shields.io/github/stars/boku7/injectEtwBypass?label=&style=flat) | ![](https://img.shields.io/github/last-commit/boku7/injectEtwBypass?label=&style=flat) | | [Needle_Sift_BOF](https://github.com/EspressoCake/Needle_Sift_BOF) | BOF that uses strstr() with user-supplied needle and filename | ![](https://img.shields.io/github/stars/EspressoCake/Needle_Sift_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/Needle_Sift_BOF?label=&style=flat) | | [BOF-ForeignLsass](https://github.com/alfarom256/BOF-ForeignLsass) | Access and dump LSASS from a foreign session | ![](https://img.shields.io/github/stars/alfarom256/BOF-ForeignLsass?label=&style=flat) | ![](https://img.shields.io/github/last-commit/alfarom256/BOF-ForeignLsass?label=&style=flat) | | [TrustedPath-UACBypass-BOF](https://github.com/netero1010/TrustedPath-UACBypass-BOF) | Trusted path UAC bypass using DCOM objects without invoking cmd.exe | ![](https://img.shields.io/github/stars/netero1010/TrustedPath-UACBypass-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/netero1010/TrustedPath-UACBypass-BOF?label=&style=flat) | | [Detect-Hooks](https://github.com/anthemtotheego/Detect-Hooks) | Detect userland API hooks by AV/EDR using BOF (original) | ![](https://img.shields.io/github/stars/anthemtotheego/Detect-Hooks?label=&style=flat) | ![](https://img.shields.io/github/last-commit/anthemtotheego/Detect-Hooks?label=&style=flat) | | [Detect-Hooks (fork)](https://github.com/xforcered/Detect-Hooks) | Fork of Detect-Hooks by xforcered | ![](https://img.shields.io/github/stars/xforcered/Detect-Hooks?label=&style=flat) | ![](https://img.shields.io/github/last-commit/xforcered/Detect-Hooks?label=&style=flat) | | [CredBandit](https://github.com/anthemtotheego/CredBandit) | Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel | ![](https://img.shields.io/github/stars/anthemtotheego/CredBandit?label=&style=flat) | ![](https://img.shields.io/github/last-commit/anthemtotheego/CredBandit?label=&style=flat) | | [CredBandit (fork)](https://github.com/xforcered/CredBandit) | Fork of CredBandit for process memory dumping via syscalls | ![](https://img.shields.io/github/stars/xforcered/CredBandit?label=&style=flat) | ![](https://img.shields.io/github/last-commit/xforcered/CredBandit?label=&style=flat) | | [bof-registry](https://github.com/ausec-it/bof-registry) | Query and modify Windows Registry from a Beacon | ![](https://img.shields.io/github/stars/ausec-it/bof-registry?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ausec-it/bof-registry?label=&style=flat) | | [extps-cobalt-strike-bof](https://github.com/thesnoom/extps-cobalt-strike-bof) | Extended process list BOF with search functionality | ![](https://img.shields.io/github/stars/thesnoom/extps-cobalt-strike-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/thesnoom/extps-cobalt-strike-bof?label=&style=flat) | | [BOF-RegSave](https://github.com/EncodeGroup/BOF-RegSave) | Dump SAM, SECURITY, and SYSTEM registry hives with BOF | ![](https://img.shields.io/github/stars/EncodeGroup/BOF-RegSave?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EncodeGroup/BOF-RegSave?label=&style=flat) | | [CVE-2020-0796-BOF](https://github.com/rsmudge/CVE-2020-0796-BOF) | Exploitation of CVE-2020-0796 (SMBGhost) via BOF | ![](https://img.shields.io/github/stars/rsmudge/CVE-2020-0796-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/rsmudge/CVE-2020-0796-BOF?label=&style=flat) | | [BOF-DLL-Inject](https://github.com/tomcarver16/BOF-DLL-Inject) | Manual DLL injection using Cobalt Strike BOFs | ![](https://img.shields.io/github/stars/tomcarver16/BOF-DLL-Inject?label=&style=flat) | ![](https://img.shields.io/github/last-commit/tomcarver16/BOF-DLL-Inject?label=&style=flat) | | [bof-NetworkServiceEscalate](https://github.com/j0urney1/bof-NetworkServiceEscalate) | Abuse Shared Logon Session ID Issue for escalation to SYSTEM | ![](https://img.shields.io/github/stars/j0urney1/bof-NetworkServiceEscalate?label=&style=flat) | ![](https://img.shields.io/github/last-commit/j0urney1/bof-NetworkServiceEscalate?label=&style=flat) | | [OSCE](https://github.com/dhn/OSCE) | Exploits from OSCE prep — may include legacy BOFs | ![](https://img.shields.io/github/stars/dhn/OSCE?label=&style=flat) | ![](https://img.shields.io/github/last-commit/dhn/OSCE?label=&style=flat) | | [CobaltWhispers](https://github.com/NVISOsecurity/CobaltWhispers) | Direct syscall-based BOFs for injection, memory allocation, and shellcode loading | ![](https://img.shields.io/github/stars/NVISOsecurity/CobaltWhispers?label=&style=flat) | ![](https://img.shields.io/github/last-commit/NVISOsecurity/CobaltWhispers?label=&style=flat) | | [HiddenDesktop](https://github.com/WKL-Sec/HiddenDesktop) | BOF to interact with hidden desktops for stealthy GUI operations. | ![](https://img.shields.io/github/stars/WKL-Sec/HiddenDesktop?label=&style=flat) | ![](https://img.shields.io/github/last-commit/WKL-Sec/HiddenDesktop?label=&style=flat) | | [ChromeKatz](https://github.com/Meckazin/ChromeKatz) | A BOF implementation for dumping credentials stored by the Chrome browser. | ![](https://img.shields.io/github/stars/Meckazin/ChromeKatz?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Meckazin/ChromeKatz?label=&style=flat) | | [Koh](https://github.com/GhostPack/Koh) | The Token Stealer BOF from GhostPack for capturing and manipulating Windows access tokens. | ![](https://img.shields.io/github/stars/GhostPack/Koh?label=&style=flat) | ![](https://img.shields.io/github/last-commit/GhostPack/Koh?label=&style=flat) | | [FriendlyFireBOF](https://github.com/ibaiC/FriendlyFireBOF) | BOF designed to interact with EDR components, potentially for disabling or tampering. | ![](https://img.shields.io/github/stars/ibaiC/FriendlyFireBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ibaiC/FriendlyFireBOF?label=&style=flat) | | [DataInject-BOF](https://github.com/iilegacyyii/DataInject-BOF) | A BOF for injecting arbitrary data into target processes. | ![](https://img.shields.io/github/stars/iilegacyyii/DataInject-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/iilegacyyii/DataInject-BOF?label=&style=flat) | | [Winsocky](https://github.com/WKL-Sec/Winsocky) | Winsocket implementation for Cobalt Strike communication | ![](https://img.shields.io/github/stars/WKL-Sec/Winsocky?label=&style=flat) | ![](https://img.shields.io/github/last-commit/WKL-Sec/Winsocky?label=&style=flat) | | [ScreenShot-BOF](https://github.com/qwqdanchun/ScreenShot-BOF) | Alternative Screenshot BOF | ![](https://img.shields.io/github/stars/qwqdanchun/ScreenShot-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/qwqdanchun/ScreenShot-BOF?label=&style=flat) | | [PPEnum](https://github.com/rasta-mouse/PPEnum) | Simple BOF to read the protection level of a process | ![](https://img.shields.io/github/stars/rasta-mouse/PPEnum?label=&style=flat) | ![](https://img.shields.io/github/last-commit/rasta-mouse/PPEnum?label=&style=flat) | | [FindObjects-BOF](https://github.com/outflanknl/FindObjects-BOF) | Enumerate processes for specific modules or process handles using syscalls | ![](https://img.shields.io/github/stars/outflanknl/FindObjects-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/outflanknl/FindObjects-BOF?label=&style=flat) | | [inject-assembly](https://github.com/kyleavery/inject-assembly) | Execute .NET in an Existing Process (alternative to fork & run) | ![](https://img.shields.io/github/stars/kyleavery/inject-assembly?label=&style=flat) | ![](https://img.shields.io/github/last-commit/kyleavery/inject-assembly?label=&style=flat) | | [GetWebDAVStatus](https://github.com/G0ldenGunSec/GetWebDAVStatus) | Determine if Web Client service (WebDAV) is running on a remote system | ![](https://img.shields.io/github/stars/G0ldenGunSec/GetWebDAVStatus?label=&style=flat) | ![](https://img.shields.io/github/last-commit/G0ldenGunSec/GetWebDAVStatus?label=&style=flat) | | [SCShell](https://github.com/Mr-Un1k0d3r/SCShell) | Fileless lateral movement tool using ChangeServiceConfigA (May use BOF) | ![](https://img.shields.io/github/stars/Mr-Un1k0d3r/SCShell?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Mr-Un1k0d3r/SCShell?label=&style=flat) | | [winrmdll](https://github.com/mez-0/winrmdll) | WinRM C++ API interaction (Likely DLL, potentially used with BOF loader) | ![](https://img.shields.io/github/stars/mez-0/winrmdll?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mez-0/winrmdll?label=&style=flat) | | [PortBender](https://github.com/praetorian-inc/PortBender) | TCP port redirection utility (Tool, likely uses driver, not strictly BOF) | ![](https://img.shields.io/github/stars/praetorian-inc/PortBender?label=&style=flat) | ![](https://img.shields.io/github/last-commit/praetorian-inc/PortBender?label=&style=flat) | | [NetUser](https://github.com/lengjibo/NetUser) | Add user via Windows API (Chinese description) | ![](https://img.shields.io/github/stars/lengjibo/NetUser?label=&style=flat) | ![](https://img.shields.io/github/last-commit/lengjibo/NetUser?label=&style=flat) | | [Process_Protection_Level_BOF](https://github.com/EspressoCake/Process_Protection_Level_BOF) | Syscall-only BOF to grab process protection attributes | ![](https://img.shields.io/github/stars/EspressoCake/Process_Protection_Level_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/Process_Protection_Level_BOF?label=&style=flat) | | [LdapSignCheck](https://github.com/cube0x0/LdapSignCheck) | Scan DC for LDAP signing/integrity settings | ![](https://img.shields.io/github/stars/cube0x0/LdapSignCheck?label=&style=flat) | ![](https://img.shields.io/github/last-commit/cube0x0/LdapSignCheck?label=&style=flat) | | [DelegationBOF](https://github.com/IcebreakerSecurity/DelegationBOF) | Check domain for abusable Kerberos delegation settings via LDAP | ![](https://img.shields.io/github/stars/IcebreakerSecurity/DelegationBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/IcebreakerSecurity/DelegationBOF?label=&style=flat) | | [BOFs (snovvcrash)](https://github.com/snovvcrash/BOFs) | WNF notification subscription & SCManager SDDL Backdoor | ![](https://img.shields.io/github/stars/snovvcrash/BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/snovvcrash/BOFs?label=&style=flat) | | [BOF-SprayAD](https://github.com/Hagrid29/BOF-SprayAD) | LDAP/Kerberos based password spray BOF | ![](https://img.shields.io/github/stars/Hagrid29/BOF-SprayAD?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Hagrid29/BOF-SprayAD?label=&style=flat) | | [Cookie-Graber-BOF](https://github.com/Mr-Un1k0d3r/Cookie-Graber-BOF) | Extract WebKit master key to decrypt user cookies | ![](https://img.shields.io/github/stars/Mr-Un1k0d3r/Cookie-Graber-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Mr-Un1k0d3r/Cookie-Graber-BOF?label=&style=flat) | | [GetWeChatBOF (in BOFTools)](https://github.com/pyroxenites/BOFTools/tree/main/GetWeChatBOF) | BOF to get WeChat information (specific version, part of BOFTools collection) | ![](https://img.shields.io/github/stars/pyroxenites/BOFTools?label=&style=flat) |![](https://img.shields.io/github/last-commit/pyroxenites/BOFTools?label=&style=flat) | | [ShadowRDP](https://github.com/c3r3br4t3/ShadowRDP) | BOF and GUI tool for Remote Assistance / Shadow RDP connection | ![](https://img.shields.io/github/stars/c3r3br4t3/ShadowRDP?label=&style=flat) | ![](https://img.shields.io/github/last-commit/c3r3br4t3/ShadowRDP?label=&style=flat) | | [kernel-mii (Northwave)](https://github.com/NorthwaveSecurity/kernel-mii) | BOF foundation for kernel exploitation using CVE-2021-21551 | ![](https://img.shields.io/github/stars/NorthwaveSecurity/kernel-mii?label=&style=flat) | ![](https://img.shields.io/github/last-commit/NorthwaveSecurity/kernel-mii?label=&style=flat) | | [CVE-2023-36874_BOF](https://github.com/Octoberfest7/CVE-2023-36874_BOF) | Weaponized BOF for CVE-2023-36874 Windows Error Reporting LPE | ![](https://img.shields.io/github/stars/Octoberfest7/CVE-2023-36874_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Octoberfest7/CVE-2023-36874_BOF?label=&style=flat) | | [PersistBOF](https://github.com/IcebreakerSecurity/PersistBOF) | Automate persistence mechanisms (Print Monitor, Time Provider, etc.) | ![](https://img.shields.io/github/stars/IcebreakerSecurity/PersistBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/IcebreakerSecurity/PersistBOF?label=&style=flat) | | [amd-ryzen-master-driver-v17-exploit](https://github.com/tijme/amd-ryzen-master-driver-v17-exploit) | Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17). | ![](https://img.shields.io/github/stars/tijme/amd-ryzen-master-driver-v17-exploit?label=&style=flat) | ![](https://img.shields.io/github/last-commit/tijme/amd-ryzen-master-driver-v17-exploit?label=&style=flat) | | [cThreadHijack](https://github.com/connormcgarr/cThreadHijack) | Beacon Object File (BOF) for remote process injection via thread hijacking. | ![](https://img.shields.io/github/stars/connormcgarr/cThreadHijack?label=&style=flat) | ![](https://img.shields.io/github/last-commit/connormcgarr/cThreadHijack?label=&style=flat) | | [BOF_dumpclip](https://github.com/topotam/BOF_dumpclip) | Beacon Object Files to dump content of clipboard. | ![](https://img.shields.io/github/stars/topotam/BOF_dumpclip?label=&style=flat) | ![](https://img.shields.io/github/last-commit/topotam/BOF_dumpclip?label=&style=flat) | | [sandbox-process-bof](https://github.com/RobertDiep/sandbox-process-bof) | A Beacon Object File (BOF) to sandbox a process. | ![](https://img.shields.io/github/stars/RobertDiep/sandbox-process-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/RobertDiep/sandbox-process-bof?label=&style=flat) | | [KillDefenderBOF](https://github.com/Cerbersec/KillDefenderBOF) | Beacon Object File PoC implementation of KillDefender (Potential variant/fork). | ![](https://img.shields.io/github/stars/Cerbersec/KillDefenderBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Cerbersec/KillDefenderBOF?label=&style=flat) | | [TokenStripBOF](https://github.com/nick-frischkorn/TokenStripBOF) | Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process. | ![](https://img.shields.io/github/stars/nick-frischkorn/TokenStripBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/nick-frischkorn/TokenStripBOF?label=&style=flat) | | [SuspendEventLogBOF](https://github.com/nick-frischkorn/SuspendEventLogBOF) | Beacon Object File to locate and suspend the threads hosting the Event Log service. | ![](https://img.shields.io/github/stars/nick-frischkorn/SuspendEventLogBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/nick-frischkorn/SuspendEventLogBOF?label=&style=flat) | | [bofs](https://github.com/stufus/bofs) | Miscellaneous Cobalt Strike Beacon Object Files by stufus. | ![](https://img.shields.io/github/stars/stufus/bofs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/stufus/bofs?label=&style=flat) | | [BOF-RemoteRegSave](https://github.com/Hagrid29/BOF-RemoteRegSave) | Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer. | ![](https://img.shields.io/github/stars/Hagrid29/BOF-RemoteRegSave?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Hagrid29/BOF-RemoteRegSave?label=&style=flat) | | [ServiceSetSD-Bof](https://github.com/0x3rhy/ServiceSetSD-Bof) | Beacon Object file set service security descriptor. | ![](https://img.shields.io/github/stars/0x3rhy/ServiceSetSD-Bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/ServiceSetSD-Bof?label=&style=flat) | | [memlist-bof](https://github.com/VirtualSamuraii/memlist-bof) | Simple BOF to list the modules loaded in memory for a specified process. | ![](https://img.shields.io/github/stars/VirtualSamuraii/memlist-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/VirtualSamuraii/memlist-bof?label=&style=flat) | | [BOF-DCOMPotato-PrintNotify](https://github.com/Hagrid29/BOF-DCOMPotato-PrintNotify) | BOF that obtains SYSTEM privilege with SeImpersonate privilege via DCOM call of PrintNotify. | ![](https://img.shields.io/github/stars/Hagrid29/BOF-DCOMPotato-PrintNotify?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Hagrid29/BOF-DCOMPotato-PrintNotify?label=&style=flat) | | [Introduction-to-BOF](https://github.com/D4rkCorp/Introduction-to-BOF) | A demo repository for a blog post on Introduction to Beacon Object Files. | ![](https://img.shields.io/github/stars/D4rkCorp/Introduction-to-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/D4rkCorp/Introduction-to-BOF?label=&style=flat) | | [CobaltStrikeBOFs](https://github.com/Und3rf10w/CobaltStrikeBOFs) | Beacon Object Files used for Cobalt Strike by Und3rf10w. | ![](https://img.shields.io/github/stars/Und3rf10w/CobaltStrikeBOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Und3rf10w/CobaltStrikeBOFs?label=&style=flat) | | [ChangeWallpaper-BOF](https://github.com/KingOfTheNOPs/ChangeWallpaper-BOF) | Cobalt Strike Beacon Object File to change the user's desktop wallpaper. | ![](https://img.shields.io/github/stars/KingOfTheNOPs/ChangeWallpaper-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/KingOfTheNOPs/ChangeWallpaper-BOF?label=&style=flat) | | [Mockingjay_BOF](https://github.com/ewby/Mockingjay_BOF) | BOF Conversion of the Mockingjay Process Injection Technique. | ![](https://img.shields.io/github/stars/ewby/Mockingjay_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ewby/Mockingjay_BOF?label=&style=flat) | | [fileSearcher](https://github.com/MaorSabag/fileSearcher) | A simple BOF (Beacon Object File) to search files in the system. | ![](https://img.shields.io/github/stars/MaorSabag/fileSearcher?label=&style=flat) | ![](https://img.shields.io/github/last-commit/MaorSabag/fileSearcher?label=&style=flat) | | [CVE-2024-35250-BOF](https://github.com/yinsel/CVE-2024-35250-BOF) | Beacon Object File (BOF) implementation for CVE-2024-35250 (Chinese description). | ![](https://img.shields.io/github/stars/yinsel/CVE-2024-35250-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/yinsel/CVE-2024-35250-BOF?label=&style=flat) | | [samdump-bof](https://github.com/0x3rhy/samdump-bof) | Beacon Object File Dump sam file (Potential variant/fork). | ![](https://img.shields.io/github/stars/0x3rhy/samdump-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/samdump-bof?label=&style=flat) | | [WhatsAppKeyBOF](https://github.com/0xRedpoll/WhatsAppKeyBOF) | A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases. | ![](https://img.shields.io/github/stars/0xRedpoll/WhatsAppKeyBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xRedpoll/WhatsAppKeyBOF?label=&style=flat) | | [Enable-EFS-BOF](https://github.com/carlisleet/Enable-EFS-BOF) | Enable EFS BOF. | ![](https://img.shields.io/github/stars/carlisleet/Enable-EFS-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/carlisleet/Enable-EFS-BOF?label=&style=flat) | | [bof-modules](https://github.com/mr-r3bot/bof-modules) | BOF for C2 framework by mr-r3bot. | ![](https://img.shields.io/github/stars/mr-r3bot/bof-modules?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mr-r3bot/bof-modules?label=&style=flat) | | [CVE-2024-35250-BOF](https://github.com/ro0tmylove/CVE-2024-35250-BOF) | Cobalt Strike BOF for CVE-2024-35250 (Chinese description, likely duplicate). | ![](https://img.shields.io/github/stars/ro0tmylove/CVE-2024-35250-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ro0tmylove/CVE-2024-35250-BOF?label=&style=flat) | | [Spawn_bof](https://github.com/ASkyeye/Spawn_bof) | BOF Spawn process using NtCreateUserProcess with ppid spoofing/block dll policy. | ![](https://img.shields.io/github/stars/ASkyeye/Spawn_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ASkyeye/Spawn_bof?label=&style=flat) | | [NetView-BOF](https://github.com/0x3rhy/NetView-BOF) | NetView BOF. | ![](https://img.shields.io/github/stars/0x3rhy/NetView-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/NetView-BOF?label=&style=flat) | | [ReadRemoteProcessCommandline_BOF](https://github.com/EspressoCake/ReadRemoteProcessCommandline_BOF) | Read command line of a remote process BOF. | ![](https://img.shields.io/github/stars/EspressoCake/ReadRemoteProcessCommandline_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/ReadRemoteProcessCommandline_BOF?label=&style=flat) | | [hookdetection-bof](https://github.com/0xflagplz/hookdetection-bof) | BOF of MrEmpy's NTapi Hook Detector. | ![](https://img.shields.io/github/stars/0xflagplz/hookdetection-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xflagplz/hookdetection-bof?label=&style=flat) | | [terminator_bof](https://github.com/BambiZombie/terminator_bof) | Generic BOF by BambiZombie (Chinese description). | ![](https://img.shields.io/github/stars/BambiZombie/terminator_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/BambiZombie/terminator_bof?label=&style=flat) | | [locate-bof](https://github.com/gatariee/locate-bof) | A BOF for locating files (like Unix 'locate'). | ![](https://img.shields.io/github/stars/gatariee/locate-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/gatariee/locate-bof?label=&style=flat) | | [addschtask_bof](https://github.com/BambiZombie/addschtask_bof) | Generic BOF for creating scheduled tasks (Chinese description). | ![](https://img.shields.io/github/stars/BambiZombie/addschtask_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/BambiZombie/addschtask_bof?label=&style=flat) | | [getloggedonBOF](https://github.com/0xSH4RKS/getloggedonBOF) | Gets logged on users on a remote machine using remote registry enumeration. | ![](https://img.shields.io/github/stars/0xSH4RKS/getloggedonBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xSH4RKS/getloggedonBOF?label=&style=flat) | | [DirectX9-Screenshot-BOF](https://github.com/0xflagplz/DirectX9-Screenshot-BOF) | Taking Screenshots with DirectX9 BOF. | ![](https://img.shields.io/github/stars/0xflagplz/DirectX9-Screenshot-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xflagplz/DirectX9-Screenshot-BOF?label=&style=flat) | | [BackupBOF](https://github.com/freefallerr/BackupBOF) | A BOF utilising SeBackupPrivilege to export reg keys. | ![](https://img.shields.io/github/stars/freefallerr/BackupBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/freefallerr/BackupBOF?label=&style=flat) | | [TimeStomp_bof](https://github.com/RobotOperator/TimeStomp_bof) | Timestomps a target file to match a source file (Potential variant/fork). | ![](https://img.shields.io/github/stars/RobotOperator/TimeStomp_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/RobotOperator/TimeStomp_bof?label=&style=flat) | | [ivanti-cve-2023-35080-privilege-escalation-bof](https://github.com/tijme/ivanti-cve-2023-35080-privilege-escalation-bof) | Ivanti Secure Access privilege escalation BOF (CVE-2023-35080). | ![](https://img.shields.io/github/stars/tijme/ivanti-cve-2023-35080-privilege-escalation-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/tijme/ivanti-cve-2023-35080-privilege-escalation-bof?label=&style=flat) | | [stoplooking](https://github.com/zimnyaa/stoplooking) | A simple BOF that disables some logging with NtSetInformationProcess. | ![](https://img.shields.io/github/stars/zimnyaa/stoplooking?label=&style=flat) | ![](https://img.shields.io/github/last-commit/zimnyaa/stoplooking?label=&style=flat) | | [wtsimpersonate_bof](https://github.com/zimnyaa/wtsimpersonate_bof) | WTSImpersonator BOF port. | ![](https://img.shields.io/github/stars/zimnyaa/wtsimpersonate_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/zimnyaa/wtsimpersonate_bof?label=&style=flat) | | [self_delete_bof](https://github.com/AgeloVito/self_delete_bof) | BOF implementation of delete self poc for locked/running files (Potential variant/fork). | ![](https://img.shields.io/github/stars/AgeloVito/self_delete_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/AgeloVito/self_delete_bof?label=&style=flat) | | [NerfDefender](https://github.com/HaydoW/NerfDefender) | BOF and C++ implementation of the Windows Defender sandboxing technique. | ![](https://img.shields.io/github/stars/HaydoW/NerfDefender?label=&style=flat) | ![](https://img.shields.io/github/last-commit/HaydoW/NerfDefender?label=&style=flat) | | [BOFRunPortable](https://github.com/9bie/BOFRunPortable) | BOF memory run exe (Chinese description). | ![](https://img.shields.io/github/stars/9bie/BOFRunPortable?label=&style=flat) | ![](https://img.shields.io/github/last-commit/9bie/BOFRunPortable?label=&style=flat) | | [CS-DropSpawn_BOF](https://github.com/gmh5225/CS-DropSpawn_BOF) | CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking (Potential variant/fork). | ![](https://img.shields.io/github/stars/gmh5225/CS-DropSpawn_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/gmh5225/CS-DropSpawn_BOF?label=&style=flat) | | [getsystem-bof](https://github.com/parzel/getsystem-bof) | BOF to execute shellcode as SYSTEM via PPID spoofing. | ![](https://img.shields.io/github/stars/parzel/getsystem-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/parzel/getsystem-bof?label=&style=flat) | | [BOF-NPPSPY](https://github.com/VoldeSec/BOF-NPPSPY) | Porting of NPPSPY to BOF for MitM user logon process. | ![](https://img.shields.io/github/stars/VoldeSec/BOF-NPPSPY?label=&style=flat) | ![](https://img.shields.io/github/last-commit/VoldeSec/BOF-NPPSPY?label=&style=flat) | | [PatchlessInlineExecute-Assembly](https://github.com/VoldeSec/PatchlessInlineExecute-Assembly) | Porting of InlineExecute-Assembly BOF with patchless AMSI/ETW bypass using hardware breakpoint. | ![](https://img.shields.io/github/stars/VoldeSec/PatchlessInlineExecute-Assembly?label=&style=flat) | ![](https://img.shields.io/github/last-commit/VoldeSec/PatchlessInlineExecute-Assembly?label=&style=flat) | | [kerbof](https://github.com/funnybananas/kerbof) | Kerberos BOFs inspired and heavily adapted from nanorobeus and rubeus. | ![](https://img.shields.io/github/stars/funnybananas/kerbof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/funnybananas/kerbof?label=&style=flat) | | [Service-Bof](https://github.com/0x3rhy/Service-Bof) | Beacon obj file Create or Delete Service. | ![](https://img.shields.io/github/stars/0x3rhy/Service-Bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/Service-Bof?label=&style=flat) | | [Evidence_BOF](https://github.com/carlnykvist/Evidence_BOF) | Collect evidence BOF. | ![](https://img.shields.io/github/stars/carlnykvist/Evidence_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/carlnykvist/Evidence_BOF?label=&style=flat) | | [PPLDump_BOF](https://github.com/fenalik/PPLDump_BOF) | Transposition of @itm4n's PPLDump project as a BOF (Potential variant/fork). | ![](https://img.shields.io/github/stars/fenalik/PPLDump_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/fenalik/PPLDump_BOF?label=&style=flat) | | [Timestamp_BOF](https://github.com/carlnykvist/Timestamp_BOF) | Timestamp BOF (Potential variant/fork). | ![](https://img.shields.io/github/stars/carlnykvist/Timestamp_BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/carlnykvist/Timestamp_BOF?label=&style=flat) | | [bof-adopt](https://github.com/slemire/bof-adopt) | BOF implementation of Adopt. Spawns a process from a process. | ![](https://img.shields.io/github/stars/slemire/bof-adopt?label=&style=flat) | ![](https://img.shields.io/github/last-commit/slemire/bof-adopt?label=&style=flat) | | [BOF-klist](https://github.com/CUHKJason/BOF-klist) | A simple BOF implementation of klist using Windows API. | ![](https://img.shields.io/github/stars/CUHKJason/BOF-klist?label=&style=flat) | ![](https://img.shields.io/github/last-commit/CUHKJason/BOF-klist?label=&style=flat) | | [AskCreds-CS](https://github.com/GeorgePatsias/AskCreds-CS) | A BOF tool to collect passwords using CredUIPromptForWindowsCredentialsName. | ![](https://img.shields.io/github/stars/GeorgePatsias/AskCreds-CS?label=&style=flat) | ![](https://img.shields.io/github/last-commit/GeorgePatsias/AskCreds-CS?label=&style=flat) | | [dump-hives-BOF](https://github.com/erberkan/dump-hives-BOF) | Dump SAM, SYSTEM and SECURITY hives under C:\ drive (Potential variant/fork). | ![](https://img.shields.io/github/stars/erberkan/dump-hives-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/erberkan/dump-hives-BOF?label=&style=flat) | | [ACG-BOF](https://github.com/timwhitez/ACG-BOF) | Preventing 3rd Party DLLs from Injecting into your Malware using Arbitrary Code Guard BOF. | ![](https://img.shields.io/github/stars/timwhitez/ACG-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/timwhitez/ACG-BOF?label=&style=flat) | | [SyscallPack](https://github.com/epichoxha/SyscallPack) | BOF and Shellcode for full DLL unhooking using dynamic syscalls. | ![](https://img.shields.io/github/stars/epichoxha/SyscallPack?label=&style=flat) | ![](https://img.shields.io/github/last-commit/epichoxha/SyscallPack?label=&style=flat) | | [ntdll-refresher-hook-removal-bof](https://github.com/js0ncheng/ntdll-refresher-hook-removal-bof) | NTDLL refresher hook removal BOF. | ![](https://img.shields.io/github/stars/js0ncheng/ntdll-refresher-hook-removal-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/js0ncheng/ntdll-refresher-hook-removal-bof?label=&style=flat) | | [pdq-bof](https://github.com/dru1d-foofus/pdq-bof) | bof for pdq deploy credential decryption - thx garrett <3 | ![](https://img.shields.io/github/stars/dru1d-foofus/pdq-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/dru1d-foofus/pdq-bof?label=&style=flat) | | [RpcDump-BOF](https://github.com/l00sy4/RpcDump-BOF) | Beacon Object File that mimics Impacket's rpcdump| ![](https://img.shields.io/github/stars/l00sy4/RpcDump-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/l00sy4/RpcDump-BOF?label=&style=flat) | | [LocklessBof](https://github.com/antroguy/LocklessBof) | A Beacon Object File (BOF) implementation of Lockless by HarmJ0y, designed to enumerate open file handles and facilitate the fileless download of locked files. Within this project, you'll find two BOFs: LocklessEnum and LocklessDownload.| ![](https://img.shields.io/github/stars/antroguy/LocklessBof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/antroguy/LocklessBof?label=&style=flat) | | [aggrokatz](https://github.com/sec-consult/aggrokatz) | Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it to parse LSASS dump files and registry hive files to extract credentials and other secrets stored without downloading the file and without uploading any suspicious code to the beacon. | ![](https://img.shields.io/github/stars/sec-consult/aggrokatz?label=&style=flat) | ![](https://img.shields.io/github/last-commit/sec-consult/aggrokatz?label=&style=flat) | | [NtCreateUserProcessBOF](https://github.com/dmcxblue/NtCreateUserProcessBOF) | An Aggressor Script that utilizes NtCreateUserProcess to run binaries | ![](https://img.shields.io/github/stars/dmcxblue/NtCreateUserProcessBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/dmcxblue/NtCreateUserProcessBOF?label=&style=flat) | | [BypassCredGuard-BOF](https://github.com/0x3rhy/BypassCredGuard-BOF) | BypassCredGuard CS BOF | ![](https://img.shields.io/github/stars/0x3rhy/BypassCredGuard-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0x3rhy/BypassCredGuard-BOF?label=&style=flat) | | [bof-winrm-client](https://github.com/FalconForceTeam/bof-winrm-client) | Cobalt Strike BOF that implements a WinRM shell client using Windows APIs. | ![](https://img.shields.io/github/stars/FalconForceTeam/bof-winrm-client?label=&style=flat) | ![](https://img.shields.io/github/last-commit/FalconForceTeam/bof-winrm-client?label=&style=flat) | | [DataBetweenBOF](https://github.com/bitBossBBQ/DataBetweenBOF) | PoC for tracking and updating data between BOF runs on the same beacon. | ![](https://img.shields.io/github/stars/bitBossBBQ/DataBetweenBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/bitBossBBQ/DataBetweenBOF?label=&style=flat) | | [Ghosting-BOF](https://github.com/qigpig/Ghosting-BOF) | 主要用于隐藏进程真实路径,进程带windows真签名 | ![](https://img.shields.io/github/stars/qigpig/Ghosting-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/qigpig/Ghosting-BOF?label=&style=flat) | | [BOF-BypassUAC](https://github.com/theomilan3/BOF-BypassUAC) | 一个BypassUAC的BOF用来bypass Windows Defender。(请给我加个星,谢谢。) | ![](https://img.shields.io/github/stars/theomilan3/BOF-BypassUAC?label=&style=flat) | ![](https://img.shields.io/github/last-commit/theomilan3/BOF-BypassUAC?label=&style= | [BOF-whoami-ldap](https://github.com/steve-embling/BOF-whoami-ldap) | Quick and dirty reimplementation of Get-LdapCurrentUser.ps1 by Lee Christensen (@tifkin_) as a BOF | ![](https://img.shields.io/github/stars/steve-embling/BOF-whoami-ldap?label=&style=flat) | ![](https://img.shields.io/github/last-commit/steve-embling/BOF-whoami-ldap?label=&style=flat) | | [createprocess-bof](https://github.com/MayerDaniel/createprocess-bof) | Simple bof that calls CreateProcess to start executables | ![](https://img.shields.io/github/stars/MayerDaniel/createprocess-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/MayerDaniel/createprocess-bof?label=&style=flat) | | [seclogon_execute_bof](https://github.com/BambiZombie/seclogon_execute_bof) | 一个普通的BOF用来执行程序 | ![](https://img.shields.io/github/stars/BambiZombie/seclogon_execute_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/BambiZombie/seclogon_execute_bof?label=&style=flat) | | [bypass_uac_bof](https://github.com/BambiZombie/bypass_uac_bof) | 一个普通的BOF用来BypassUAC | ![](https://img.shields.io/github/stars/BambiZombie/bypass_uac_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/BambiZombie/bypass_uac_bof?label=&style=flat) | | [Defender-Exclusions-Creator-BOF](https://github.com/EspressoCake/Defender-Exclusions-Creator-BOF) | A BOF to add or remove Windows Defender exclusions: | ![](https://img.shields.io/github/stars/EspressoCake/Defender-Exclusions-Creator-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/EspressoCake/Defender-Exclusions-Creator-BOF?label=&style=flat) | | [BOF](https://github.com/vaq130/BOF) | Firewall_Enumerator_BOF | ![](https://img.shields.io/github/stars/vaq130/BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/vaq130/BOF?label=&style=flat) | | [winrmsh](https://github.com/219adlab/winrmsh) | BOF of winrm shell | ![](https://img.shields.io/github/stars/219adlab/winrmsh?label=&style=flat) | ![](https://img.shields.io/github/last-commit/219adlab/winrmsh?label=&style=flat) | | [logon_monitor](https://github.com/thatwinterquiet/logon_monitor) | A BOF to regularly check for active users on a target. | ![](https://img.shields.io/github/stars/thatwinterquiet/logon_monitor?label=&style=flat) | ![](https://img.shields.io/github/last-commit/thatwinterquiet/logon_monitor?label=&style=flat) | | [RAIWhateverTrigger](https://github.com/klezVirus/RAIWhateverTrigger) | A BOF implementation of RAITrigger for system coercions. | ![](https://img.shields.io/github/stars/klezVirus/RAIWhateverTrigger?label=&style=flat) | ![](https://img.shields.io/github/last-commit/klezVirus/RAIWhateverTrigger?label=&style=flat) | | [sekken-enum](https://github.com/Nomad0x7/sekken-enum) | Active Directory Web Services (ADWS) enumeration BOF | ![](https://img.shields.io/github/stars/Nomad0x7/sekken-enum?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Nomad0x7/sekken-enum?label=&style=flat) | | [msi_lateral_mv](https://github.com/werdhaihai/msi_lateral_mv) | Lateral Movement BOF with MSI ODBC Driver Install | ![](https://img.shields.io/github/stars/werdhaihai/msi_lateral_mv?label=&style=flat) | ![](https://img.shields.io/github/last-commit/werdhaihai/msi_lateral_mv?label=&style=flat) | | [ColdWer](https://github.com/0xsh3llf1r3/ColdWer) | Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass | ![](https://img.shields.io/github/stars/0xsh3llf1r3/ColdWer?label=&style=flat) | ![](https://img.shields.io/github/last-commit/0xsh3llf1r3/ColdWer?label=&style=flat) | | [nix_bof_template](https://github.com/outflanknl/nix_bof_template) | Beacon Object File (BOF) Template for Linux | ![](https://img.shields.io/github/stars/outflanknl/nix_bof_template?label=&style=flat) | ![](https://img.shields.io/github/last-commit/outflanknl/nix_bof_template?label=&style=flat) | | [Cobaltstrike_BOFLoader](https://github.com/CodeXTF2/Cobaltstrike_BOFLoader) | Open source port/reimplementation of the Cobalt Strike BOF Loader | ![](https://img.shields.io/github/stars/CodeXTF2/Cobaltstrike_BOFLoader?label=&style=flat) | ![](https://img.shields.io/github/last-commit/CodeXTF2/Cobaltstrike_BOFLoader?label=&style=flat) | | [bof_template](https://github.com/CodeXTF2/bof_template) | BOF template with boflink and mutator kit support | ![](https://img.shields.io/github/stars/CodeXTF2/bof_template?label=&style=flat) | ![](https://img.shields.io/github/last-commit/CodeXTF2/bof_template?label=&style=flat) | | [CS-EDR-Enumeration](https://github.com/VirtualAlllocEx/CS-EDR-Enumeration) | Cobalt Strike Aggressor Script for identifying security products — six enumeration methods rated by noise level | ![](https://img.shields.io/github/stars/VirtualAlllocEx/CS-EDR-Enumeration?label=&style=flat) | ![](https://img.shields.io/github/last-commit/VirtualAlllocEx/CS-EDR-Enumeration?label=&style=flat) | | [Async_BOFs](https://github.com/9Insomnie/Async_BOFs) | Async BOF framework for running event-detecting monitoring tasks that report back to Cobalt Strike | ![](https://img.shields.io/github/stars/9Insomnie/Async_BOFs?label=&style=flat) | ![](https://img.shields.io/github/last-commit/9Insomnie/Async_BOFs?label=&style=flat) | | [DPAPI-BOF](https://github.com/toneillcodes/DPAPI-BOF) | DPAPI hunting and parsing BOF for Cobalt Strike | ![](https://img.shields.io/github/stars/toneillcodes/DPAPI-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/toneillcodes/DPAPI-BOF?label=&style=flat) | | [linux-bof-loader](https://github.com/jm33-m0/linux-bof-loader) | Standalone C implementation of a BOF loader for Linux x86-64 | ![](https://img.shields.io/github/stars/jm33-m0/linux-bof-loader?label=&style=flat) | ![](https://img.shields.io/github/last-commit/jm33-m0/linux-bof-loader?label=&style=flat) | | [ListModulesBOF](https://github.com/CodeXTF2/ListModulesBOF) | BOF to list loaded modules in a process | ![](https://img.shields.io/github/stars/CodeXTF2/ListModulesBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/CodeXTF2/ListModulesBOF?label=&style=flat) | | [bof-clipboard-monitor](https://github.com/justJackiee/bof-clipboard-monitor) | BOF for monitoring clipboard contents | ![](https://img.shields.io/github/stars/justJackiee/bof-clipboard-monitor?label=&style=flat) | ![](https://img.shields.io/github/last-commit/justJackiee/bof-clipboard-monitor?label=&style=flat) | | [coercer_bof](https://github.com/robhughes72/coercer_bof) | Authentication coercion BOF | ![](https://img.shields.io/github/stars/robhughes72/coercer_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/robhughes72/coercer_bof?label=&style=flat) | | [enumlochost](https://github.com/damaidec/enumlochost) | Situational awareness BOF for local host enumeration during pentests | ![](https://img.shields.io/github/stars/damaidec/enumlochost?label=&style=flat) | ![](https://img.shields.io/github/last-commit/damaidec/enumlochost?label=&style=flat) | | [lsawhisper-bof](https://github.com/dazzyddos/lsawhisper-bof) | A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, without touching LSASS process memory. | ![](https://img.shields.io/github/stars/dazzyddos/lsawhisper-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/dazzyddos/lsawhisper-bof?label=&style=flat) | | [PEREDBOEMPATAT-BOF](https://github.com/TailoredSecOps/PEREDBOEMPATAT-BOF) | LocalPotato NTLM reflection exploit (CVE-2023-21746) as a Cobalt Strike Beacon Object File | ![](https://img.shields.io/github/stars/TailoredSecOps/PEREDBOEMPATAT-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/TailoredSecOps/PEREDBOEMPATAT-BOF?label=&style=flat) | | [RegPwnBOF](https://github.com/Flangvik/RegPwnBOF) | Registry symlink race condition LPE exploit (CVE-2026-24291) as a Cobalt Strike BOF | ![](https://img.shields.io/github/stars/Flangvik/RegPwnBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Flangvik/RegPwnBOF?label=&style=flat) | | [toastnotify-bof](https://github.com/brmkit/toastnotify-bof) | abusing windows toast notifications for fun and user manipulation | ![](https://img.shields.io/github/stars/brmkit/toastnotify-bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/brmkit/toastnotify-bof?label=&style=flat) | | [BOF-IPMIHash](https://github.com/sudonoodle/BOF-IPMIHash) | BOF to capture an IPMI 2.0 RAKP password hash | ![](https://img.shields.io/github/stars/sudonoodle/BOF-IPMIHash?label=&style=flat) | ![](https://img.shields.io/github/last-commit/sudonoodle/BOF-IPMIHash?label=&style=flat) | | [trustme](https://github.com/Meowmycks/trustme) | BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation | ![](https://img.shields.io/github/stars/Meowmycks/trustme?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Meowmycks/trustme?label=&style=flat) | | [SilentChrome-BOF](https://github.com/ChoiSG/SilentChrome-BOF) | BOF to silently install browser extensions into Chrome or Edge by modifying Preferences files | ![](https://img.shields.io/github/stars/ChoiSG/SilentChrome-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ChoiSG/SilentChrome-BOF?label=&style=flat) | | [VeeamDumper-BOF](https://github.com/MWR-CyberSec/VeeamDumper-BOF) | Credential extraction BOF for Veeam Backup & Replication and Veeam One | ![](https://img.shields.io/github/stars/MWR-CyberSec/VeeamDumper-BOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/MWR-CyberSec/VeeamDumper-BOF?label=&style=flat) | --- ## Not on Github These are BOFs not found on GitHub, but on Gitlab or other places. | Project | Description | Stars | Last commit | |---------|-------------|-------|-------------| | [BOF-Adios](https://gitlab.com/nephosec/bof-adios) | BOF Adios is based on the (awesome) work from Nerdworks Blogorama, which you can find here: https://blogorama.nerdworks.in/selfdeletingexecutables/ |![](https://img.shields.io/gitlab/stars/nephosec/bof-adios?label=&style=flat) | ![](https://img.shields.io/gitlab/last-commit/nephosec/bof-adios?label=&style=flat) | | [BOF-JobControl](https://gitlab.com/nephosec/bof-jobcontrol) | Tamper with processes to limit their bandwidth, CPU, etc. | ![](https://img.shields.io/gitlab/stars/nephosec/bof-jobcontrol?label=&style=flat) | ![](https://img.shields.io/gitlab/last-commit/nephosec/bof-jobcontrol?label=&style=flat) | --- ## Supporting Tools (Not BOFs Themselves) These are BOF related tools that are not BOFs themselves. | Project | Description | Stars | Last commit | |---------|-------------|-------|-------------| | [HelpColor](https://github.com/outflanknl/HelpColor) | A utility to add color support to the help output of Cobalt Strike BOFs. | ![](https://img.shields.io/github/stars/outflanknl/HelpColor?label=&style=flat) | ![](https://img.shields.io/github/last-commit/outflanknl/HelpColor?label=&style=flat) | | [bofhound](https://github.com/coffeegist/bofhound) | Tool to generate BloodHound-compatible JSON data from LDAP logs, often used in conjunction with reconnaissance BOFs. | ![](https://img.shields.io/github/stars/coffeegist/bofhound?label=&style=flat) | ![](https://img.shields.io/github/last-commit/coffeegist/bofhound?label=&style=flat) | | [bin2shell](https://github.com/l0n3m4n/bin2shell) | Convert binaries to shellcode formats including BOF loader | ![](https://img.shields.io/github/stars/l0n3m4n/bin2shell?label=&style=flat) | ![](https://img.shields.io/github/last-commit/l0n3m4n/bin2shell?label=&style=flat) | | [BOFRyptor](https://github.com/securifybv/BOFRyptor) | Assembly-level obfuscation/loader utilities for BOFs | ![](https://img.shields.io/github/stars/securifybv/BOFRyptor?label=&style=flat) | ![](https://img.shields.io/github/last-commit/securifybv/BOFRyptor?label=&style=flat) | | [Bof2PIC](https://github.com/timwhitez/Bof2PIC) | Convert BOF/COFF to shellcode (PIC) using Golang | ![](https://img.shields.io/github/stars/timwhitez/Bof2PIC?label=&style=flat) | ![](https://img.shields.io/github/last-commit/timwhitez/Bof2PIC?label=&style=flat) | | [InlineWhispers2](https://github.com/Sh0ckFR/InlineWhispers2) | Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2 | ![](https://img.shields.io/github/stars/Sh0ckFR/InlineWhispers2?label=&style=flat) | ![](https://img.shields.io/github/last-commit/Sh0ckFR/InlineWhispers2?label=&style=flat) | | [InlineWhispers3](https://github.com/tdeerenberg/InlineWhispers3) | InlineWhispers3 is an updated version of InlineWhispers2, designed to work with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOFs) using SysWhispers3. This tool helps changing SysWhispers3 generated files to be BOF compatible. | ![](https://img.shields.io/github/stars/tdeerenberg/InlineWhispers3?label=&style=flat) | ![](https://img.shields.io/github/last-commit/tdeerenberg/InlineWhispers3?label=&style=flat) | | [llvmpass_for_bof](https://github.com/h0li3/llvmpass_for_bof) | A simple llvm pass used in BOF compiling | ![](https://img.shields.io/github/stars/h0li3/llvmpass_for_bof?label=&style=flat) | ![](https://img.shields.io/github/last-commit/h0li3/llvmpass_for_bof?label=&style=flat) | | [lnkcreate_bofnet](https://github.com/inzlain/lnkcreate_bofnet) | BOF.NET class for creating LNK files | ![](https://img.shields.io/github/stars/inzlain/lnkcreate_bofnet?label=&style=flat) | ![](https://img.shields.io/github/last-commit/inzlain/lnkcreate_bofnet?label=&style=flat) | | [BOF-Builder](https://github.com/ceramicskate0/BOF-Builder) | .NET 5.0 tool to mass-build BOFs | ![](https://img.shields.io/github/stars/ceramicskate0/BOF-Builder?label=&style=flat) | ![](https://img.shields.io/github/last-commit/ceramicskate0/BOF-Builder?label=&style=flat) | | [SharpMailBOF](https://github.com/xenoscr/SharpMailBOF) | A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay. | ![](https://img.shields.io/github/stars/xenoscr/SharpMailBOF?label=&style=flat) | ![](https://img.shields.io/github/last-commit/xenoscr/SharpMailBOF?label=&style=flat) | | [BOFMask](https://github.com/passthehashbrowns/BOFMask) | BOFMask is a proof-of-concept for masking Cobalt Strike's Beacon payload while executing a Beacon Object File (BOF). | ![](https://img.shields.io/github/stars/passthehashbrowns/BOFMask?label=&style=flat) | ![](https://img.shields.io/github/last-commit/passthehashbrowns/BOFMask?label=&style=flat) | | [BOFMask (fork)](https://github.com/xforcered/BOFMask) | Fork of passthehashbrowns’ BOFMask project | ![](https://img.shields.io/github/stars/xforcered/BOFMask?label=&style=flat) | ![](https://img.shields.io/github/last-commit/xforcered/BOFMask?label=&style=flat) | | [Shoggoth](https://github.com/frkngksl/Shoggoth) | Shoggoth: Asmjit Based Polymorphic Encryptor | ![](https://img.shields.io/github/stars/frkngksl/Shoggoth?label=&style=flat) | ![](https://img.shields.io/github/last-commit/frkngksl/Shoggoth?label=&style=flat) | | [wpd_com](https://github.com/mannyfred/wpd_com) | Windows Portable Device COM BOF for enumerating and listing files on connected portable devices | ![](https://img.shields.io/github/stars/mannyfred/wpd_com?label=&style=flat) | ![](https://img.shields.io/github/last-commit/mannyfred/wpd_com?label=&style=flat) | ---