Ridter / cs_custom_404
Cobalt strike custom 404 page
☆63Updated 4 years ago
Alternatives and similar repositories for cs_custom_404:
Users that are interested in cs_custom_404 are comparing it to the libraries listed below
- Cobalt Strike AggressorScripts CVE-2020-0796☆79Updated 4 years ago
- 404 File not found C2 PoC☆30Updated 8 years ago
- SharpAddDomainMachine☆67Updated 3 years ago
- ☆18Updated 4 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 3 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 3 years ago
- ☆28Updated 4 years ago
- ☆35Updated 5 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆43Updated 4 years ago
- Use powershell to getsystem with token dumplication☆10Updated 5 years ago
- CVE-2020-10199 回显版本☆31Updated 6 months ago
- AggressorScript-RunDumpHash☆19Updated 5 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆28Updated 5 years ago
- Cobalt Strike Aggressor Scripts☆70Updated 5 years ago
- server2012-Group-policy-RCE☆47Updated 5 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆45Updated 3 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆33Updated 5 years ago
- Citrix ADC从权限绕过到RCE☆46Updated 4 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago
- CVE-2020–14882 by Jang☆29Updated 4 years ago
- Just pick out the code we need.☆60Updated 5 years ago
- Web ExternalC2 Demo☆50Updated 4 years ago
- WinrmCmd/WinrmShell ( Golang\PowerShell\Python)☆33Updated 4 years ago
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Updated 5 years ago