eremit4 / cs-discoveryLinks
Detecting Cobalt Strike Team Servers on targets through traffic telemetry.
☆22Updated last year
Alternatives and similar repositories for cs-discovery
Users that are interested in cs-discovery are comparing it to the libraries listed below
Sorting:
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- ☆18Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- ☆43Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆44Updated 2 months ago
- Discord as a C2☆49Updated 5 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 4 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Updated 4 years ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 5 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- ☆19Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 4 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- Execute embedded Mimikatz☆13Updated 4 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 4 years ago