P4x1s / CobaltStrike-4.8-CrackedView external linksLinks
CobaltStrike 4.8 Cracked
☆66May 5, 2023Updated 2 years ago
Alternatives and similar repositories for CobaltStrike-4.8-Cracked
Users that are interested in CobaltStrike-4.8-Cracked are comparing it to the libraries listed below
Sorting:
- CobaltStrike4.8 破解版☆23Apr 13, 2023Updated 2 years ago
- ☆12Feb 20, 2025Updated 11 months ago
- A Go tool to obfuscate and deobfuscate the code and file.☆13May 29, 2022Updated 3 years ago
- HW2022公开的POC整理☆11Jul 31, 2022Updated 3 years ago
- Web remote control, written in Go☆12Nov 2, 2023Updated 2 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆14Jun 4, 2025Updated 8 months ago
- 免杀shellcode☆14Sep 8, 2021Updated 4 years ago
- Yet another awesome fuzzers list☆15Oct 25, 2024Updated last year
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 2 years ago
- 批量扫描url是否存在sql注入问题☆15Nov 29, 2022Updated 3 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated 10 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- log4j 1.x RCE Poc -- CVE-2021-4104☆20Dec 14, 2021Updated 4 years ago
- ☆20Dec 11, 2020Updated 5 years ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆202Jun 25, 2024Updated last year
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆25Jul 26, 2024Updated last year
- 处于原型阶段☆20Nov 30, 2021Updated 4 years ago
- Github repository which contains a functional exploit for CVE-2021-39165☆22Jul 13, 2022Updated 3 years ago
- ☆13May 24, 2023Updated 2 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆33Jan 23, 2025Updated last year
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- A collection of interesting REXX scripts to ease the life a mainframe pentester☆27Jan 31, 2017Updated 9 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- cve-2022-33891-poc☆52Jul 20, 2022Updated 3 years ago
- Malicious Shortcut(.lnk) Generator☆86Nov 23, 2018Updated 7 years ago
- Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.☆26May 26, 2022Updated 3 years ago
- cs手机版的源码,此处不放源jar包,自行添加编译☆55Nov 3, 2022Updated 3 years ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- desktop screenshot☆29Apr 26, 2023Updated 2 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Apr 13, 2023Updated 2 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 7 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆159Jun 19, 2025Updated 7 months ago
- Collection of Rust repos useful for Red Teamers.☆34Sep 23, 2022Updated 3 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- A C/S trojan tools to control romate Windows machine.☆66Oct 11, 2024Updated last year