A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.
☆12Jun 20, 2016Updated 9 years ago
Alternatives and similar repositories for cortana-scripts
Users that are interested in cortana-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- A Python package for a basic CLI and GUI user interface☆13Mar 12, 2024Updated 2 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Nov 25, 2014Updated 11 years ago
- Uclicious is a flexible reduced boilerplate configuration framework.☆20Apr 25, 2023Updated 2 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- ☆17Jan 27, 2022Updated 4 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- woodpecker框架专用bcel库☆12Apr 30, 2021Updated 4 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Jun 20, 2016Updated 9 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆21Jul 11, 2021Updated 4 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- ☆51Feb 5, 2014Updated 12 years ago
- ida pro collapse plugin☆30Jul 26, 2023Updated 2 years ago
- ☆13Feb 5, 2022Updated 4 years ago
- This program will connect multiple masters (SCADA master stations) to single slave (RTU) as defined protocol IEC 60870-5-104. Although th…☆15Dec 19, 2021Updated 4 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- Files related to video tutorials from my YouTube channel!☆12Mar 12, 2019Updated 7 years ago
- Injector with kernel power☆18Jan 2, 2021Updated 5 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 3 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Forwards external public ports to internal ports without router access.☆138Sep 8, 2012Updated 13 years ago
- Reports in .MD format☆21Jul 8, 2025Updated 8 months ago
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Mar 4, 2024Updated 2 years ago
- Flash最新钓鱼源码对接官方API实现跟随官方升级而升级☆12Sep 30, 2020Updated 5 years ago
- SMT Modeling and Configurable Program Analysis for Ghidra's PCODE☆34Updated this week
- Code released with Shmoocon Firetalks and Epilogue talks☆45Jan 14, 2016Updated 10 years ago
- CVE-2020-2555☆14Mar 10, 2020Updated 6 years ago
- Easy encrypt/decrypt data with TPM☆25Feb 28, 2024Updated 2 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 3 years ago
- YApi REC 远程代码执行漏洞利用工具☆13Aug 28, 2021Updated 4 years ago