HuskyHacks / CobaltNotionLinks
A spin-off research project. Cobalt Strike x Notion collab 2022
☆53Updated 3 years ago
Alternatives and similar repositories for CobaltNotion
Users that are interested in CobaltNotion are comparing it to the libraries listed below
Sorting:
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆62Updated 2 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- Beacon Object Files.☆35Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆55Updated last year
- ☆57Updated 4 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 8 months ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated last year
- Cobalt Strike BOF for quser.exe implementation using Windows API☆86Updated 2 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆40Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- AV/EDR evasion via direct system calls.☆108Updated last year
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆140Updated 3 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆24Updated 3 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- ☆71Updated last year
- DLL Exports Extraction BOF with optional NTFS transactions.☆82Updated 3 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆35Updated 4 years ago
- Section Mapping Process Injection modified with SysWhisper2 (sw2-secinject): Cobalt Strike BOF☆43Updated 3 years ago
- AutoStart teamserver and listeners with services☆73Updated 3 years ago
- my learning case about windows☆21Updated 3 years ago
- ☆53Updated 3 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 2 years ago