CodeXTF2 / cobaltstrike-headlessLinks
Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.
☆147Updated 3 years ago
Alternatives and similar repositories for cobaltstrike-headless
Users that are interested in cobaltstrike-headless are comparing it to the libraries listed below
Sorting:
- ☆88Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆150Updated 4 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆130Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated 2 years ago
- BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs☆187Updated 4 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Updated last year
- Bypass Detection By Randomising ROR13 API Hashes☆143Updated 3 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆103Updated 4 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Updated 3 years ago
- A basic emulation of an "RPC Backdoor"☆242Updated 3 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Updated 2 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆187Updated 5 months ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Updated 3 years ago
- Beacon Object File PoC implementation of KillDefender☆235Updated 3 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆79Updated 3 years ago
- Perform DCSync operation without mimikatz☆153Updated last year
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆247Updated 3 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆146Updated 4 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆101Updated 4 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133Updated 3 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Updated 2 years ago
- Coerce Windows machines auth via MS-EVEN☆171Updated 2 years ago
- ☆143Updated 2 years ago
- ☆142Updated 3 years ago
- Utilizing hardware breakpoints to evade monitoring by Endpoint Detection and Response platforms☆133Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Updated 3 years ago