CodeXTF2 / cobaltstrike-headlessLinks
Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.
☆149Updated 2 years ago
Alternatives and similar repositories for cobaltstrike-headless
Users that are interested in cobaltstrike-headless are comparing it to the libraries listed below
Sorting:
- ☆88Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆185Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆149Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆126Updated 3 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆183Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated 8 months ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆80Updated 2 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆141Updated 3 years ago
- ErebusGate for Nim Bypass AV/EDR☆161Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆56Updated 2 years ago
- Perform DCSync operation without mimikatz☆147Updated 8 months ago
- Beacon Object File PoC implementation of KillDefender☆230Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆131Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- To audit the security of read-only domain controllers☆117Updated last year
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆156Updated last year
- In-memory token vault BOF for Cobalt Strike☆145Updated 2 years ago
- C# Port of LdapRelayScan☆85Updated 3 years ago
- ☆142Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆241Updated 2 years ago
- ☆56Updated last year
- ☆88Updated 2 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆97Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆82Updated last year
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆132Updated last year
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆130Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆115Updated 3 years ago