CodeXTF2 / cobaltstrike-headlessLinks
Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.
☆149Updated 3 years ago
Alternatives and similar repositories for cobaltstrike-headless
Users that are interested in cobaltstrike-headless are comparing it to the libraries listed below
Sorting:
- ☆88Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Updated 3 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆150Updated 3 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆114Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆127Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆185Updated 4 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆170Updated 11 months ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆187Updated 2 months ago
- Perform DCSync operation without mimikatz☆148Updated 11 months ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated 2 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- To audit the security of read-only domain controllers☆117Updated last year
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆89Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆104Updated 4 years ago
- DCSync Attack from Outside using Impacket☆115Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆87Updated last year
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆131Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆202Updated 3 years ago
- Winsocket for Cobalt Strike.☆100Updated 2 years ago
- ErebusGate for Nim Bypass AV/EDR☆164Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆59Updated 2 years ago
- ☆92Updated 2 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Updated 3 years ago
- ☆57Updated last year
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆112Updated 3 years ago