MichaelKoczwara / CobaltStrike-C2-ServersView external linksLinks
Cobalt Strike/C2 Servers
☆13Apr 22, 2021Updated 4 years ago
Alternatives and similar repositories for CobaltStrike-C2-Servers
Users that are interested in CobaltStrike-C2-Servers are comparing it to the libraries listed below
Sorting:
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Detect and remove the presence of canary tokens☆25Dec 9, 2023Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Aug 13, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- ☆67May 22, 2023Updated 2 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- Malleable C2 profiles for Cobalt Strike☆75Sep 9, 2022Updated 3 years ago
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- Simulates a compromise in a cloud and container environment☆33Dec 18, 2024Updated last year
- Python API Client for Cortex☆32Feb 24, 2022Updated 3 years ago
- Red Team Templates For Obsidian.md☆32Jan 7, 2022Updated 4 years ago
- Bitcoin miner runs at the possible highest speed your pc can handle☆11Nov 1, 2022Updated 3 years ago
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 10 months ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- ☆10Oct 9, 2024Updated last year
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 6 years ago
- This contains the public CCDC materials for Cyber@UCR.☆38Dec 2, 2023Updated 2 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 4 years ago
- log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)☆36Jan 7, 2022Updated 4 years ago
- generate CobaltStrike's cross-platform payload☆34Jun 16, 2024Updated last year
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- JavaScript for Automation (JXA) macOS agent☆91Feb 2, 2026Updated 2 weeks ago
- Terraform script to deploy AD-based environment on Azure☆41Apr 22, 2023Updated 2 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆39Jul 11, 2019Updated 6 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- ☆99Feb 16, 2021Updated 5 years ago