This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be used in other scripts.
☆16Aug 12, 2025Updated 6 months ago
Alternatives and similar repositories for aggressor_script_examples
Users that are interested in aggressor_script_examples are comparing it to the libraries listed below
Sorting:
- ☆13Nov 24, 2021Updated 4 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Remove API hooks from a Beacon process.☆76Mar 13, 2022Updated 3 years ago
- ☆36Dec 4, 2025Updated 2 months ago
- ☆18Sep 1, 2025Updated 6 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Jun 22, 2020Updated 5 years ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆255Nov 24, 2025Updated 3 months ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated 3 weeks ago
- ☆12Feb 18, 2026Updated last week
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆72Updated this week
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated 3 weeks ago
- code for the Proxy DLL example blog post☆62Oct 29, 2021Updated 4 years ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 4 months ago
- wolfSSL Intrusion Detection and Prevention System (IDPS)☆44Feb 16, 2026Updated 2 weeks ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated 11 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- A tool to plot spectrogram images using hackrf_sweep, soapy_power, or rtl_power output.☆37Jul 23, 2025Updated 7 months ago
- Context Hub Runtime Environment (CHRE)☆10Oct 17, 2023Updated 2 years ago
- ☆13Mar 4, 2017Updated 8 years ago
- ☆10Feb 23, 2026Updated last week
- An extensible component for detecting cosmetic contact lenses in iris imagery.☆10Jun 25, 2025Updated 8 months ago
- EPICS support for multi-channel analyzers (MCA) and multi-channel scalers (MCS).☆12Aug 25, 2025Updated 6 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- [TPAMI 2022] Disentangling Light Fields for Super-Resolution and Disparity Estimation☆13Apr 2, 2024Updated last year
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- A static tool to analyze the history of your git repository☆11Nov 9, 2023Updated 2 years ago
- Simple Socket Protocol for Embedded Systems☆12Dec 12, 2025Updated 2 months ago
- ☆10Sep 10, 2025Updated 5 months ago
- Python wrapper for wolfSSL embedded SSL/TLS library.☆42Dec 30, 2025Updated 2 months ago
- Heroes of Might and Magic III damage calculator.☆16Jun 22, 2022Updated 3 years ago
- Web game, clone of Chrome's dinosaur game.☆10Jan 5, 2023Updated 3 years ago
- gcnano-binaries☆11Feb 9, 2026Updated 3 weeks ago
- ☆13Dec 21, 2025Updated 2 months ago
- Python utilities for submitting jobs on high performance computing systems☆11Feb 23, 2026Updated last week
- ☆13Sep 12, 2025Updated 5 months ago
- Spoofcheck☆46May 21, 2025Updated 9 months ago
- ☆11May 21, 2021Updated 4 years ago
- A flying and rock-shooting game☆17Oct 14, 2021Updated 4 years ago