CodeXTF2 / cobaltstrike-headlessLinks
Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.
☆147Updated 3 years ago
Alternatives and similar repositories for cobaltstrike-headless
Users that are interested in cobaltstrike-headless are comparing it to the libraries listed below
Sorting:
- ☆88Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆150Updated 4 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆130Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Updated last year
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆187Updated 4 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Updated 3 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Updated 2 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 4 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆143Updated 3 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Updated 4 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆187Updated 6 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Updated 3 years ago
- ☆142Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated last year
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆235Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆204Updated 3 years ago
- A basic emulation of an "RPC Backdoor"☆242Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆171Updated 2 years ago
- Perform DCSync operation without mimikatz☆153Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆133Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆146Updated 4 years ago
- ☆161Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆103Updated 4 years ago