Cobalt-Strike / teamserver-propLinks
TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot and keylog callback data, which allows you to tweak the fix for the “HotCobalt” vulnerability. This repository contains an example file that contains the default settings.
☆68Updated 3 months ago
Alternatives and similar repositories for teamserver-prop
Users that are interested in teamserver-prop are comparing it to the libraries listed below
Sorting:
- CVE-2021-1675 (PrintNightmare)☆76Updated 4 years ago
- ☆37Updated 7 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆46Updated 6 years ago
- Another Go Shellcode Loader using Windows APIs☆141Updated 4 years ago
- ☆18Updated 4 years ago
- An improvement over the original Mimikatz wrapper.☆19Updated 4 years ago
- Cobalt Strike Team Server Password Brute Forcer☆29Updated 5 years ago
- Security Support Provider Interface☆47Updated 5 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆150Updated 3 years ago
- StenographyShellcodeLoader☆43Updated 5 years ago
- generate CobaltStrike's cross-platform payload☆34Updated last year
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 3 years ago
- Reworked version of NCC Group's [SharpZeroLogon](https://github.com/nccgroup/nccfsas/tree/main/Tools/SharpZeroLogon) for .NET Framework 3…☆28Updated 4 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46Updated 4 years ago
- CVE-2021-21972☆33Updated 4 years ago
- dump lsass tool☆38Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- a patched sshd for red team activities☆83Updated 4 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 5 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61Updated 3 years ago
- MacOS C2 Framework☆85Updated 4 years ago
- CVE-2019-1040 with Kerberos delegation☆34Updated 4 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 4 years ago
- LOLBINs that inject a DLL into a given process ID.☆139Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85Updated 2 years ago
- CVE-2021-26855 & CVE-2021-27065☆28Updated 4 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Updated 5 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Updated 4 years ago