RomanEmelyanov / CobaltStrikeForensic
Toolset for research malware and Cobalt Strike beacons
☆211Updated last month
Alternatives and similar repositories for CobaltStrikeForensic:
Users that are interested in CobaltStrikeForensic are comparing it to the libraries listed below
- Static based decoders for malware samples☆93Updated 4 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- Python api for usage with cobalt strike's External C2 specification☆234Updated 2 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆143Updated 7 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 5 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- Lateral Movement technique using DCOM and HTA☆232Updated 2 years ago
- A collection of useful scripts for Cobalt Strike☆170Updated 8 months ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- Splunk Dashboard for CobaltStrike logs☆89Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- CobaltStrike External C2 for Websockets☆193Updated 5 years ago
- Ex-pv8's☆63Updated 5 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated last month
- Automated Tactics Techniques & Procedures☆253Updated last year
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 6 years ago
- ☆79Updated 8 years ago
- ☆229Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆271Updated 5 years ago
- Presentation material presented by Outflank team members at public events.☆187Updated 4 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 5 years ago
- ☆169Updated 7 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 6 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆124Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆122Updated 4 years ago