Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from silent in-process BOF to full PowerShell/WMI.
☆42Feb 6, 2026Updated last month
Alternatives and similar repositories for CS-EDR-Enumeration
Users that are interested in CS-EDR-Enumeration are comparing it to the libraries listed below
Sorting:
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 3 months ago
- ☆58Dec 10, 2025Updated 3 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- ☆43Dec 24, 2025Updated 2 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 7 months ago
- Awesome MalDev Links☆52Updated this week
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 8 months ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆225Mar 13, 2026Updated last week
- Block Windows Defender by deny ACL☆88Jan 12, 2026Updated 2 months ago
- Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons☆192Feb 11, 2026Updated last month
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated last month
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆38Nov 11, 2025Updated 4 months ago
- ☆26Aug 5, 2025Updated 7 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆67Dec 15, 2025Updated 3 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Python tool to automatically perform SPN-less RBCD attacks.☆124Jan 7, 2026Updated 2 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆78Mar 13, 2026Updated last week
- ☆81Feb 12, 2026Updated last month
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆28Feb 4, 2026Updated last month
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆78Oct 27, 2025Updated 4 months ago
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 7 months ago
- ☆37Dec 4, 2025Updated 3 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆19Updated this week
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆93Updated this week
- ☆48Dec 5, 2025Updated 3 months ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Updated this week
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- ☆41Oct 8, 2024Updated last year
- An Ansible collection that installs an SCCM deployment with optional configurations.☆101Dec 8, 2025Updated 3 months ago
- ☆36Feb 5, 2026Updated last month
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆167Jan 12, 2026Updated 2 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 6 months ago