danieldurnea / Cobalt-Strike---Cheat-SheetLinks
Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and evaluate mature security programs.
☆16Updated 2 years ago
Alternatives and similar repositories for Cobalt-Strike---Cheat-Sheet
Users that are interested in Cobalt-Strike---Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- Automate Scoping, OSINT and Recon assessments.☆96Updated 7 months ago
- ☆25Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- ☆65Updated last year
- Red Teaming tools and techniques☆54Updated 2 years ago
- Discovering Typo Squatting on your domains!☆71Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- ☆24Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆51Updated 3 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 5 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆87Updated 11 months ago
- ☆65Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- ☆35Updated 5 months ago
- ☆41Updated 8 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆20Updated 4 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆89Updated 3 months ago
- Garudaastra Tool is based on python3 to find cameras around the world☆27Updated 2 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- ☆92Updated 2 years ago