chryzsh / Aggressor-ScriptsLinks
Aggressor scripts for Cobalt Strike
☆57Updated 5 years ago
Alternatives and similar repositories for Aggressor-Scripts
Users that are interested in Aggressor-Scripts are comparing it to the libraries listed below
Sorting:
- Port of Invoke-Excel4DCOM☆105Updated 5 years ago
- Credential Dumper☆77Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 5 years ago
- Helper script for mangling CS payloads☆51Updated 6 years ago
- Smart overlay for Cobalt Strike PS function☆31Updated 6 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Updated 4 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- Suite of Shellcode Running Utilities☆111Updated 5 years ago
- External C2 Using IE COM Objects☆100Updated 6 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- PowerView menu for Cobalt Strike☆67Updated 7 years ago
- ☆46Updated 3 years ago
- .Net Assembly to block ETW telemetry in current process☆79Updated 5 years ago
- ☆48Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- Microsoft Applocker evasion tool☆39Updated 5 years ago
- ☆54Updated 6 years ago
- Aggressor Script to Execute Assemblies from Github☆71Updated 4 years ago
- Load C# Code straight to memory☆54Updated 5 years ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆62Updated 4 years ago
- Cobalt Strike cna script for randomized argument spoofing☆52Updated 6 years ago
- PoC to interact with local/remote registry hives through WMI☆86Updated 4 years ago
- ☆38Updated 5 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆61Updated 3 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- My musings with C#☆28Updated 2 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91Updated 3 years ago