eremit4 / cs-discoveryLinks
Detecting Cobalt Strike Team Servers on targets through traffic telemetry.
☆22Updated last year
Alternatives and similar repositories for cs-discovery
Users that are interested in cs-discovery are comparing it to the libraries listed below
Sorting:
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- ☆18Updated last year
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆41Updated last month
- Discord as a C2☆49Updated 4 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- ☆43Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆49Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆23Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Updated 4 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 4 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Lexmark CVE-2023-26067☆27Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 4 years ago
- Slides and materials for conference presentations☆11Updated 2 years ago