Cobalt-Strike / community_kitLinks
Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be challenging to locate. Community Kit is a central repository of extensions written by the user community to extend the capabilities of Cobalt Strike. The…
☆384Updated this week
Alternatives and similar repositories for community_kit
Users that are interested in community_kit are comparing it to the libraries listed below
Sorting:
- Useful C2 techniques and cheat sheets learned from engagements☆550Updated last month
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆381Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,026Updated last year
- ☆240Updated 5 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- ☆714Updated last year
- PowerShell Script Obfuscator☆573Updated last year
- Simple & Powerful PowerShell Script Obfuscator☆581Updated 5 months ago
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆284Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆572Updated 3 years ago
- PowerShell Ransomware Simulator with C2 Server☆489Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,299Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆421Updated last year
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆489Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆339Updated 2 years ago
- ☆1,034Updated 7 months ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,091Updated 2 years ago
- "Golden" certificates☆705Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆804Updated last month
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆984Updated 3 years ago
- Open source C2 server created for stealth red team operations☆828Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆762Updated 10 months ago
- Some notes and examples for cobalt strike's functionality☆1,114Updated 3 years ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆279Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆305Updated 2 years ago
- ☆422Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆474Updated 3 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆724Updated 2 months ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆627Updated 6 months ago