CodeXTF2 / cobaltstrike-headlessLinks
Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.
☆146Updated 3 years ago
Alternatives and similar repositories for cobaltstrike-headless
Users that are interested in cobaltstrike-headless are comparing it to the libraries listed below
Sorting:
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Updated 3 years ago
- ☆88Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆151Updated 4 years ago
- AV/EDR evasion via direct system calls.☆108Updated 2 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆188Updated 4 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆114Updated 2 years ago
- POC tools for exploring SMB over QUIC protocol☆128Updated 3 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆187Updated 4 months ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Updated last year
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆239Updated 3 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- Perform DCSync operation without mimikatz☆153Updated last year
- To audit the security of read-only domain controllers☆117Updated 2 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆101Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆203Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆134Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated last year
- ☆144Updated 2 years ago
- ☆102Updated 2 years ago
- A basic emulation of an "RPC Backdoor"☆243Updated 3 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆132Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆105Updated 4 years ago
- In-memory token vault BOF for Cobalt Strike☆145Updated 3 years ago
- Coerce Windows machines auth via MS-EVEN☆171Updated last year
- ☆142Updated 3 years ago
- Winsocket for Cobalt Strike.☆101Updated 2 years ago