NexusFuzzy / CobaltSpamLinks
Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons
☆370Updated last month
Alternatives and similar repositories for CobaltSpam
Users that are interested in CobaltSpam are comparing it to the libraries listed below
Sorting:
- ☆453Updated 4 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆917Updated 4 years ago
- Cobalt Strike random C2 Profile generator☆677Updated 2 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆948Updated last year
- Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.…☆849Updated 3 years ago
- Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on☆569Updated 2 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆609Updated 2 years ago
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- .NET Project for Attacking vCenter☆553Updated 4 years ago
- Resources About Cobalt Strike. 100+ Tools And 200+ Posts.☆258Updated 5 years ago
- ☆296Updated last year
- A native backdoor module for Microsoft IIS (Internet Information Services)☆551Updated 5 years ago
- ☆388Updated 4 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆271Updated 4 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- NTDS.dit offline dumper with non-elevated☆220Updated 7 years ago
- Cobalt Strike Shellcode Generator☆667Updated 10 months ago
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆554Updated last year
- Use python to perform Kerberos pre-auth bruteforcing☆203Updated 2 years ago
- Cobalt Strike kit for Persistence☆486Updated 5 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,091Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆717Updated 4 years ago
- Use to build an anonymous SMB file server.☆232Updated 4 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆333Updated 4 years ago
- ☆1,115Updated last year
- Run shellcode from resource☆260Updated 4 years ago
- ☆186Updated 4 years ago
- Scan installed EDRs and AVs on Windows☆598Updated 4 months ago
- Proof of Concept Exploit for vCenter CVE-2021-21972☆265Updated 4 years ago
- Cobalt Strike Python API☆301Updated 3 years ago