0x727 / AggressorScripts_0x727
Cobalt Strike AggressorScripts For Red Team
☆154Updated 3 years ago
Alternatives and similar repositories for AggressorScripts_0x727:
Users that are interested in AggressorScripts_0x727 are comparing it to the libraries listed below
- NTLM relay test.☆187Updated last year
- Take a screenshot without injection for Cobalt Strike☆183Updated last year
- Implement load Cobalt Strike & Metasploit&Sliver shellcode with golang☆125Updated 2 years ago
- Cobalt Strike BOF that Add an admin user☆71Updated 2 years ago
- Dumping Windows Local Credentials Tools/Tricks☆68Updated 5 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆278Updated last year
- Bypass AV 用户添加☆167Updated 3 years ago
- 获取Exchange信息的小工具☆224Updated last year
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated 8 months ago
- Memshell☆270Updated 3 years ago
- CobaltStrike 4.0 - 4.5 Patch☆174Updated 2 years ago
- ☆100Updated 2 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆187Updated 2 years ago
- PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers☆91Updated 2 years ago
- RedTeam参考,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips☆89Updated 3 years ago
- Some Attacks of Exchange SSRF ProxyLogon&ProxyShell☆165Updated 3 years ago
- Bypass cobaltstrike beacon config scan☆82Updated 3 years ago
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆117Updated 3 years ago
- This is a easy tool for gen VBA code, and bypass most antivirus☆60Updated 3 years ago
- If you only have hash, you can still operate exchange☆72Updated 3 years ago
- PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。☆147Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆88Updated last year
- Offensive C# Tooling☆101Updated 5 months ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆151Updated 2 years ago
- Zerologon exploit with restore DC password automatically☆132Updated last year
- ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)☆179Updated 3 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆79Updated 2 years ago
- cve-2022-23131 exp☆93Updated 3 years ago
- CobaltStrike and Google Auth twice☆65Updated 3 years ago
- 利用 NTLMSSP 探测 Windows 信息☆167Updated 2 years ago