NVISOsecurity / pyCobaltHound
pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Bloodhound.
☆135Updated last year
Related projects ⓘ
Alternatives and complementary repositories for pyCobaltHound
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- ☆95Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆117Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆258Updated 2 years ago
- ☆112Updated last year
- ☆118Updated last year
- Extendable payload obfuscation and delivery framework☆141Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆85Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆149Updated last year
- Cortex XDR Config Extractor☆119Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Bypassing AppLocker with C#☆136Updated 3 years ago
- Koppeling x Metatwin x LazySign☆203Updated 3 years ago
- ACL abuse swiss-knife☆117Updated last year
- C# tool to discover low hanging fruits☆89Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆56Updated 2 years ago
- ☆151Updated 2 weeks ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆189Updated 4 months ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆250Updated last year
- Start new PowerShell without etw and amsi in pure nim☆157Updated 2 years ago
- Easy red team phishing with Puppeteer☆127Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆225Updated last year
- Powershell version of SharpGPOAbuse☆70Updated 3 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆124Updated last year
- ☆46Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆292Updated 2 years ago
- A Python based ingestor for BloodHound☆81Updated 2 years ago