Repository for archiving Cobalt Strike configuration
☆36Mar 11, 2026Updated last week
Alternatives and similar repositories for CobaltStrike-Config
Users that are interested in CobaltStrike-Config are comparing it to the libraries listed below
Sorting:
- Extended Static Analysis Tool for Analyzing Android APK Files.☆15Jan 3, 2024Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- ☆34Nov 11, 2025Updated 4 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆18Mar 26, 2024Updated last year
- Ransomware groups posts☆44Mar 3, 2026Updated 2 weeks ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- Vulnerable demo application for the race condition☆22Apr 27, 2021Updated 4 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- BYOVD collection☆24Mar 20, 2024Updated 2 years ago
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- ☆16Apr 21, 2023Updated 2 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 6 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Jan 23, 2020Updated 6 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated last year
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆34May 26, 2019Updated 6 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 5 months ago
- Terraform playbook of a vulnerable Azure deployment☆11Apr 28, 2022Updated 3 years ago
- A dynamic unpacking tool☆149Sep 17, 2023Updated 2 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆65May 13, 2024Updated last year
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆64Nov 15, 2025Updated 4 months ago
- VCL-based UI components for system tools that use NtUtilsLibrary☆21Mar 4, 2026Updated 2 weeks ago
- Payload Generation Framework☆21Oct 24, 2024Updated last year
- ☆27Oct 1, 2025Updated 5 months ago
- ☆33Jan 23, 2025Updated last year
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago