001SPARTaN / aggressor_scriptsLinks
A collection of useful scripts for Cobalt Strike
☆173Updated last year
Alternatives and similar repositories for aggressor_scripts
Users that are interested in aggressor_scripts are comparing it to the libraries listed below
Sorting:
- ☆211Updated 6 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆173Updated 7 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆184Updated last year
- CobaltStrike External C2 for Websockets☆197Updated 6 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆289Updated 8 years ago
- Python api for usage with cobalt strike's External C2 specification☆242Updated 2 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 8 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Updated 7 years ago
- Malleable C2 profiles for Cobalt Strike☆75Updated 3 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆142Updated 8 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆134Updated 7 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆155Updated 7 years ago
- Lateral Movement technique using DCOM and HTA☆235Updated 3 years ago
- ☆273Updated 3 years ago
- ☆182Updated 7 years ago
- Various Aggressor Scripts I've Created.☆151Updated 4 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 10 months ago
- A C# implementation of PrivExchange by @_dirkjan.☆156Updated 6 years ago
- Cobalt Strike Aggressor Scripts☆143Updated last year
- ☆73Updated 8 years ago
- lateral movement techniques that can be used during red team exercises☆273Updated 5 years ago
- PowerDNS: Powershell DNS Delivery☆214Updated 7 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Updated 7 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆126Updated 10 years ago
- initial commit☆174Updated 7 years ago
- Constrained Language Mode + AMSI bypass all in one☆160Updated 6 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆207Updated 7 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Updated 7 years ago
- Run shellcode from resource☆260Updated 5 years ago
- Splunk Dashboard for CobaltStrike logs☆90Updated 4 years ago