Covenant is a collaborative .NET C2 framework for red teamers.
☆41May 3, 2021Updated 4 years ago
Alternatives and similar repositories for Covenant
Users that are interested in Covenant are comparing it to the libraries listed below
Sorting:
- ☆10Jun 28, 2021Updated 4 years ago
- ☆199Oct 14, 2019Updated 6 years ago
- ☆13Jul 15, 2021Updated 4 years ago
- discover IP ranges. check email security. survey domains.☆40Mar 9, 2023Updated 3 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆73May 18, 2020Updated 5 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Jan 3, 2021Updated 5 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,557Oct 17, 2022Updated 3 years ago
- ☆199Feb 27, 2026Updated 3 weeks ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Feb 23, 2026Updated 3 weeks ago
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Aug 17, 2022Updated 3 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆19Dec 3, 2020Updated 5 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 5 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆126Jun 22, 2020Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- A collection of Cobalt Strike aggressor scripts☆17Jul 7, 2020Updated 5 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated 3 weeks ago
- ☆185Jan 5, 2021Updated 5 years ago
- Dll that can be used for side loading and other attack vector.☆205Sep 17, 2020Updated 5 years ago
- Active Directory Labs/exams Review☆262Mar 18, 2021Updated 5 years ago
- ☆18Apr 15, 2024Updated last year
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- A red team emulation tool deveoped by CyCraft Technology☆25Apr 18, 2024Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- NSE script to automatically discover SD-WAN nodes☆23Sep 4, 2019Updated 6 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆131Oct 10, 2021Updated 4 years ago