bluscreenofjeff / Malleable-C2-RandomizerLinks
A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls
☆447Updated 3 years ago
Alternatives and similar repositories for Malleable-C2-Randomizer
Users that are interested in Malleable-C2-Randomizer are comparing it to the libraries listed below
Sorting:
- Aggressor scripts I've made for Cobalt Strike☆410Updated 2 years ago
- Some useful scripts for CobaltStrike☆853Updated 4 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆870Updated 3 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,009Updated 7 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆607Updated 2 years ago
- ☆307Updated 6 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- ☆526Updated 3 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆418Updated 2 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆380Updated 6 years ago
- Cobalt Strike Python API☆301Updated 3 years ago
- ☆350Updated 3 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆308Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,036Updated 5 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆445Updated last year
- ☆273Updated 3 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆247Updated 8 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆491Updated 5 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆283Updated 7 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆510Updated 6 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆536Updated 6 years ago
- ntlm relay attack to Exchange Web Services☆334Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Updated 2 years ago
- Shellcode wrapper with encryption for multiple target languages☆440Updated 8 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Updated 6 years ago
- Search for potential frontable domains☆637Updated 2 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆330Updated 5 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Updated 3 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,129Updated 4 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆482Updated 3 years ago