0xMrNiko / Cobalt-Strike-Cheat-Sheet
☆19Updated 2 years ago
Alternatives and similar repositories for Cobalt-Strike-Cheat-Sheet:
Users that are interested in Cobalt-Strike-Cheat-Sheet are comparing it to the libraries listed below
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- ☆47Updated 2 years ago
- ☆27Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆43Updated last year
- ☆24Updated 3 years ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆1Updated 7 months ago
- offensive notes & resources☆40Updated last week
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆53Updated 11 months ago
- ☆16Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆52Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated last month
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- ☆51Updated last month
- Post-exploitation tool for attacking Active Directory domain controllers☆17Updated 2 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆49Updated 3 years ago