0xbad53c / OffSecOps-Arsenal
Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.
☆25Updated 8 months ago
Alternatives and similar repositories for OffSecOps-Arsenal:
Users that are interested in OffSecOps-Arsenal are comparing it to the libraries listed below
- ☆16Updated last year
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- ☆25Updated 3 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆21Updated 10 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆34Updated 6 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 10 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last year
- ☆47Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆32Updated last month
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- A VSCode plugin to assist with BOF development.☆34Updated 8 months ago
- ☆28Updated 10 months ago
- SAM Dumping in C#☆46Updated 3 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- A simple rpc2socks alternative in pure Go.☆28Updated 9 months ago
- Beacon Object Files (not Buffer Overflows)☆53Updated 2 years ago
- Unix Process hollowing in rust☆21Updated 4 months ago
- ☆18Updated 3 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- Validates priv escalation of AD trusts☆39Updated 2 weeks ago
- Extract registry and NTDS secrets from local or remote disk images☆39Updated last month
- ☆27Updated 2 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- ☆29Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 8 months ago
- ☆33Updated 3 months ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year