Peco602 / cobaltstrike-aggressor-scripts
A collection of Cobalt Strike Aggressor scripts.
☆92Updated 3 years ago
Alternatives and similar repositories for cobaltstrike-aggressor-scripts:
Users that are interested in cobaltstrike-aggressor-scripts are comparing it to the libraries listed below
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 10 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆106Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Continuous password spraying tool☆174Updated 3 weeks ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆71Updated 3 years ago
- Lateral Movement☆123Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- ☆171Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆192Updated 5 months ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- ☆116Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆137Updated 7 months ago
- ☆148Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆184Updated last year
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆170Updated last month
- Cortex XDR Config Extractor☆131Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆150Updated 8 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆200Updated 3 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆165Updated 9 months ago
- ☆79Updated last month
- ☆96Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆135Updated 7 months ago
- 「💀」Proof of concept on BYOVD attack☆155Updated 3 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- C2 Infrastructure Automation☆97Updated 2 weeks ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆111Updated last week
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 8 months ago