Cobalt-Strike / sleep_python_bridge
This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client. NOTE: This project is very much in BETA. The goal is to provide a playground for testing and is in no way an officially support feature. Perhaps this could be somet…
☆171Updated last year
Alternatives and similar repositories for sleep_python_bridge:
Users that are interested in sleep_python_bridge are comparing it to the libraries listed below
- My CobaltStrike BOFS☆160Updated 2 years ago
- Beacon Object File PoC implementation of KillDefender☆218Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆141Updated 3 years ago
- Perform DCSync operation without mimikatz☆142Updated 2 months ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆214Updated last year
- AV/EDR evasion via direct system calls.☆107Updated last year
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆99Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL…☆162Updated last year
- Bypass Detection By Randomising ROR13 API Hashes☆134Updated 2 years ago
- ☆160Updated 2 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆201Updated 2 years ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆189Updated 4 years ago
- Useful Cobalt Strike BOFs found or used during engagements☆136Updated last year
- Coerce Windows machines auth via MS-EVEN☆154Updated last year
- Extendable payload obfuscation and delivery framework☆141Updated 2 years ago
- Shellcode injection POC using syscalls.☆117Updated 4 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆89Updated 2 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- Remove API hooks from a Beacon process.☆265Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆122Updated 2 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆176Updated 3 years ago
- C# version of Powermad☆158Updated last year
- Convert shellcode generated using pe_2_shellcode to cdb format.☆96Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- nuke that event log using some epic dinvoke fu☆116Updated 3 years ago
- ☆139Updated 2 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆147Updated 2 years ago
- C# version of MDSec's ParallelSyscalls☆140Updated 3 years ago