Cobalt-Strike / teamserver-propLinks
TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot and keylog callback data, which allows you to tweak the fix for the “HotCobalt” vulnerability. This repository contains an example file that contains the default settings.
☆68Updated 5 months ago
Alternatives and similar repositories for teamserver-prop
Users that are interested in teamserver-prop are comparing it to the libraries listed below
Sorting:
- CVE-2021-1675 (PrintNightmare)☆77Updated 4 years ago
- ☆37Updated 8 years ago
- Security Support Provider Interface☆47Updated 5 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆46Updated 6 years ago
- Reworked version of NCC Group's [SharpZeroLogon](https://github.com/nccgroup/nccfsas/tree/main/Tools/SharpZeroLogon) for .NET Framework 3…☆29Updated 4 years ago
- Another Go Shellcode Loader using Windows APIs☆141Updated 4 years ago
- ☆18Updated 4 years ago
- StenographyShellcodeLoader☆43Updated 5 years ago
- Cobalt Strike Team Server Password Brute Forcer☆29Updated 5 years ago
- CVE-2021-21972☆33Updated 4 years ago
- CVE-2019-1040 with Kerberos delegation☆34Updated 4 years ago
- backdoor c2☆40Updated 6 years ago
- generate CobaltStrike's cross-platform payload☆34Updated last year
- dump lsass tool☆38Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆77Updated 3 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 3 years ago
- An improvement over the original Mimikatz wrapper.☆19Updated 4 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 5 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆151Updated 4 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Updated 4 years ago
- MacOS C2 Framework☆85Updated 4 years ago
- SharpAddDomainMachine☆69Updated 4 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61Updated 3 years ago
- RDI implementation in Nim☆64Updated 5 years ago
- CVE-2021-26855 & CVE-2021-27065☆28Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- proxyshell payload generate☆75Updated 4 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46Updated 4 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago