FindObjects-BOF is a Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific modules or process handles.
What Is This Repository For?
Why Do I Need This?
Utilizing direct systems calls via inline assembly in BOF code provides a more opsec safe way of interacting with the system. Using direct system calls avoids AV/EDR software intercepting user-mode API calls.
FindModule
bof can be used to identify processes which have a certain module loaded, for example the .NET runtime clr.dll
or the winhttp.dll
module. This information can be used to select a more opsec safe spawnto candidate when using Cobalt Strike’s execute-assembly
or before injecting an exfill beacon shellcode using the shinject
command.FindProcHandle
bof can be used to identify processes with a specific process handle in use, for example processes using a handle to the lsass.exe
process. If there’s a process within the system with a lsass.exe
process handle, we could use this existing process/handle to read or write memory without opening a new process handle. This bypasses certain AV/EDR’s capabilities of detecting and blocking LSASS process/memory access.How Do I Set This Up?
We will not supply compiled binaries. You will have to do this yourself:
sudo port install mingw-w64
).make
command to compile the Beacon object file.Script Manager
to load the FindObjects.cna script.FindProcHandle
or FindModule
command with the required parameters (e.g. module or process name).Introduction Unlock the full potential of your Linux system with this comprehensive guide to essential…
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…