0xMrNiko / Cobalt-Strike-Cheat-SheetLinks
☆22Updated 3 years ago
Alternatives and similar repositories for Cobalt-Strike-Cheat-Sheet
Users that are interested in Cobalt-Strike-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- ☆52Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆47Updated 3 years ago
- ☆27Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 3 years ago
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆36Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- ☆44Updated 10 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 2 months ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Discord C2 Profile for Mythic☆29Updated 3 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆38Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆19Updated 2 years ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 7 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Windows Post-Exploitation tools wrapper☆12Updated 11 months ago