Cobalt-Strike / community_kit
Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be challenging to locate. Community Kit is a central repository of extensions written by the user community to extend the capabilities of Cobalt Strike. The…
☆343Updated this week
Alternatives and similar repositories for community_kit:
Users that are interested in community_kit are comparing it to the libraries listed below
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆361Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆904Updated 9 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,200Updated last year
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,072Updated last year
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆258Updated last year
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆392Updated 6 months ago
- Useful C2 techniques and cheatsheets learned from engagements☆481Updated 2 weeks ago
- PowerShell Script Obfuscator☆523Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆300Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆693Updated last month
- Some notes and examples for cobalt strike's functionality☆1,010Updated 3 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆288Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆708Updated 2 months ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆859Updated 4 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆704Updated last year
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆272Updated 7 months ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆526Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆633Updated last year
- ☆195Updated 5 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆479Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆325Updated 5 months ago
- Simple & Powerful PowerShell Script Obfuscator☆555Updated last year
- ☆766Updated 2 years ago
- Cobalt Strike kit for Lateral Movement☆663Updated 5 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆956Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,075Updated 11 months ago
- Another Windows Local Privilege Escalation from Service Account to System☆838Updated 2 years ago
- ☆946Updated last month
- Various Cobalt Strike BOFs☆619Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆459Updated 2 years ago