Ridter / cs_custom_404
Cobalt strike custom 404 page
☆63Updated 4 years ago
Alternatives and similar repositories for cs_custom_404:
Users that are interested in cs_custom_404 are comparing it to the libraries listed below
- Cobalt Strike AggressorScripts CVE-2020-0796☆78Updated 4 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- Cobalt Strike Aggressor Scripts☆70Updated 5 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Updated 5 years ago
- 404 File not found C2 PoC☆30Updated 8 years ago
- SharpAddDomainMachine☆67Updated 3 years ago
- CVE-2020-10199 回显版本☆31Updated 9 months ago
- ☆28Updated 5 years ago
- CVE-2021-21972☆32Updated 4 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 3 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆44Updated 4 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆78Updated 5 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago
- 蚁剑其他脚本AES编/解码器☆36Updated 5 years ago
- mssql 终端连接工具|命令执行☆40Updated 5 years ago
- Web ExternalC2 Demo☆51Updated 4 years ago
- Just pick out the code we need.☆62Updated 5 years ago
- PhishingExploit☆23Updated 6 years ago
- AggressorScript-RunDumpHash☆19Updated 5 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Updated 6 years ago
- WinrmCmd/WinrmShell ( Golang\PowerShell\Python)☆33Updated 4 years ago
- python ShellCode Loader (Cobaltstrike&Metasploit)☆20Updated 5 years ago
- CVE-2020–14882 by Jang☆29Updated 4 years ago
- CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)☆44Updated 4 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆47Updated 3 years ago
- ☆77Updated 6 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆28Updated 5 years ago
- AggressorScript-UploadAndRunFrp/上传frpc并且运行frpc☆63Updated 5 years ago
- ☆39Updated 5 years ago
- server2012-Group-policy-RCE☆47Updated 5 years ago