WKL-Sec / docker-cobaltstrike
Docker container for running CobaltStrike 4.7 and above
☆19Updated last month
Alternatives and similar repositories for docker-cobaltstrike
Users that are interested in docker-cobaltstrike are comparing it to the libraries listed below
Sorting:
- Scripts to interact with Microsoft Graph APIs☆36Updated 6 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 11 months ago
- Enumerate the Domain for Readable and Writable Shares☆18Updated 2 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆38Updated 3 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆24Updated 2 months ago
- Linux CS bypass technique☆33Updated 3 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 2 months ago
- ☆34Updated 4 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆25Updated 3 months ago
- Extract registry and NTDS secrets from local or remote disk images☆40Updated last month
- ☆11Updated 2 months ago
- ☆18Updated 4 months ago
- ☆50Updated 6 months ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆14Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆30Updated 4 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated last month
- ☆22Updated 7 months ago
- Automatically deploy Nemesis☆21Updated 10 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated last month
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- ☆44Updated last month
- Leveraging AWS Lambda Function URLs for C2 Redirection☆32Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆47Updated 3 weeks ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆19Updated 2 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- ☆30Updated last week
- Tool to aid in dumping LSASS process remotely☆38Updated 9 months ago