RomanEmelyanov / CobaltStrikeForensic
Toolset for research malware and Cobalt Strike beacons
☆208Updated last week
Alternatives and similar repositories for CobaltStrikeForensic:
Users that are interested in CobaltStrikeForensic are comparing it to the libraries listed below
- Simulating Adversary Operations☆93Updated 6 years ago
- Static based decoders for malware samples☆92Updated 4 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆122Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆231Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 4 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆151Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆227Updated last year
- An Insider Threat Toolkit☆149Updated 6 years ago
- Splunk Dashboard for CobaltStrike logs☆86Updated 4 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- CobaltStrike External C2 for Websockets☆194Updated 5 years ago
- A collection of useful scripts for Cobalt Strike☆166Updated 7 months ago
- ☆78Updated 8 years ago
- ☆92Updated 6 years ago
- Malleable C2 profiles for Cobalt Strike☆70Updated 2 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Updated 6 years ago
- ☆229Updated 6 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆107Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆270Updated 5 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Scripts for performing and detecting parent PID spoofing☆144Updated 4 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆135Updated 5 years ago
- Ex-pv8's☆64Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆145Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆256Updated 6 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆89Updated 5 years ago
- Constrained Language Mode + AMSI bypass all in one☆156Updated 5 years ago
- A tool to run .Net DLLs from the command line☆102Updated 6 years ago