bluscreenofjeff / Malleable-C2-RandomizerLinks
A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls
☆447Updated 3 years ago
Alternatives and similar repositories for Malleable-C2-Randomizer
Users that are interested in Malleable-C2-Randomizer are comparing it to the libraries listed below
Sorting:
- Aggressor scripts I've made for Cobalt Strike☆410Updated 2 years ago
- Some useful scripts for CobaltStrike☆853Updated 4 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆873Updated 3 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆607Updated 2 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,009Updated 7 years ago
- ☆307Updated 6 years ago
- ☆523Updated 3 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆349Updated 5 years ago
- Cobalt Strike Python API☆301Updated 3 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆418Updated 2 years ago
- ☆350Updated 3 years ago
- ☆273Updated 3 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆380Updated 6 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆306Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,040Updated 5 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆511Updated 6 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆284Updated 7 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆445Updated last year
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆330Updated 6 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆326Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆524Updated 2 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆537Updated 6 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆382Updated 5 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆482Updated 3 years ago
- Run shellcode from resource☆260Updated 4 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆253Updated 7 years ago
- eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)☆466Updated 2 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Updated 4 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Updated 3 years ago
- ☆187Updated 4 years ago