cisagov / teamserver-packerLinks
Create an AMI with CobaltStrike and related tools.
☆10Updated last week
Alternatives and similar repositories for teamserver-packer
Users that are interested in teamserver-packer are comparing it to the libraries listed below
Sorting:
- Some Pentesting Scripts☆11Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- golang String Obfuscate☆9Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Strategy for building a Red Team☆17Updated last year
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18Updated 5 years ago
- Obtain and parse SSL certificates☆10Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- ☆15Updated last year
- ☆15Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- ☆18Updated 6 months ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- ☆20Updated 5 years ago
- ☆12Updated 2 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Template repo for Conjur repositories☆17Updated 3 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Concept:☆11Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago