0xMrNiko / Cobalt-Strike-Cheat-SheetLinks
☆26Updated 3 years ago
Alternatives and similar repositories for Cobalt-Strike-Cheat-Sheet
Users that are interested in Cobalt-Strike-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- ☆38Updated 3 years ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 2 years ago
- ☆122Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- offensive notes & resources☆43Updated 7 months ago
- Automated exploitation of MSSQL servers at scale☆128Updated this week
- Creates and sends fake meeting invite☆71Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Retrieve AD accounts description and search for password in it☆82Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- Windows Privilege Escalation☆69Updated 3 years ago
- ☆119Updated 8 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆22Updated 2 months ago
- ☆42Updated 3 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Duplicate not owned Token from Running Process☆73Updated 2 years ago
- Rewriting SIET to python3☆54Updated last year
- Get Fine Grained Password Policy☆78Updated 7 months ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆19Updated 3 years ago
- C# tool to discover low hanging fruits☆96Updated 2 years ago