SpiderMate / Red-Teaming
Ex-pv8's
☆63Updated 5 years ago
Alternatives and similar repositories for Red-Teaming:
Users that are interested in Red-Teaming are comparing it to the libraries listed below
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆119Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆109Updated 5 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated last month
- CACTUSTORCH: Payload Generation for Adversary Simulations☆75Updated 6 years ago
- Splunk Dashboard for CobaltStrike logs☆88Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 2 years ago
- C# Targeted Attack Reconnissance Tools☆121Updated 4 years ago
- Python api for usage with cobalt strike's External C2 specification☆228Updated 2 years ago
- Malleable C2 profiles for Cobalt Strike☆70Updated 2 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- Cobalt Strike SCT payload obfuscator☆141Updated 7 years ago
- ☆128Updated last year
- Smart overlay for Cobalt Strike PS function☆31Updated 6 years ago
- ☆92Updated 6 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆124Updated 6 years ago
- Port of Invoke-Excel4DCOM☆103Updated 5 years ago
- An Insider Threat Toolkit☆149Updated 6 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Updated 6 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago
- with metasploit☆62Updated 4 years ago
- initial commit☆43Updated 4 months ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 7 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆142Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆52Updated 5 years ago
- checkO365 is a tool to check if a target domain is using O365☆84Updated 6 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- ☆59Updated 4 years ago