Repository for archiving Cobalt Strike configuration
☆36Updated this week
Alternatives and similar repositories for CobaltStrike-Config
Users that are interested in CobaltStrike-Config are comparing it to the libraries listed below
Sorting:
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated 10 months ago
- Surface Analysis System on Cloud☆19Dec 21, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- Vulnerable demo application for the race condition☆22Apr 27, 2021Updated 4 years ago
- BYOVD collection☆24Mar 20, 2024Updated last year
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- Extended Static Analysis Tool for Analyzing Android APK Files.☆14Jan 3, 2024Updated 2 years ago
- What makes it page☆17Aug 24, 2022Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated 11 months ago
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 4 months ago
- Basically pipes.sh but rewritten in Python☆13Nov 16, 2025Updated 3 months ago
- ☆34Nov 11, 2025Updated 3 months ago
- A dynamic unpacking tool☆147Sep 17, 2023Updated 2 years ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Sep 3, 2025Updated 5 months ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- ☆15Feb 22, 2021Updated 5 years ago
- 2021年4月15日出现的Chrome payload☆14Apr 15, 2021Updated 4 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- VCL-based UI components for system tools that use NtUtilsLibrary☆21Nov 20, 2025Updated 3 months ago
- Utility to remove digital code signature from binary PE files in Windows.☆17Apr 25, 2021Updated 4 years ago
- Using fibers to run in-memory code.☆242Oct 19, 2023Updated 2 years ago
- MAPS cloud scanner and response parser for Microsoft Defender research.☆70Feb 19, 2026Updated last week
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun l…☆21Feb 15, 2014Updated 12 years ago
- Understanding the operation and limitations of Sysmon's events☆23Sep 15, 2022Updated 3 years ago