danieldurnea / Cobalt-Strike---Cheat-SheetLinks
Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and evaluate mature security programs.
☆16Updated 3 years ago
Alternatives and similar repositories for Cobalt-Strike---Cheat-Sheet
Users that are interested in Cobalt-Strike---Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- Automate Scoping, OSINT and Recon assessments.☆111Updated last week
- Powershell tools used for Red Team / Pentesting.☆80Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- ☆65Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- ☆65Updated 2 years ago
- Discovering Typo Squatting on your domains!☆81Updated last year
- ☆25Updated 3 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago
- ☆90Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- 🕵️ Email osint tool☆64Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 8 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Script related in Active Directory Attacks Domain☆24Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Updated 2 years ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated 2 years ago
- ☆24Updated 2 years ago
- Azure Service Subdomain Enumeration☆71Updated last year