fox-it / cobaltstrike-extraneous-space
Historical list of {Cobalt Strike,NanoHTTPD} servers
☆122Updated 5 years ago
Alternatives and similar repositories for cobaltstrike-extraneous-space:
Users that are interested in cobaltstrike-extraneous-space are comparing it to the libraries listed below
- Splunk Dashboard for CobaltStrike logs☆86Updated 3 years ago
- Toolset for research malware and Cobalt Strike beacons☆207Updated 2 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆101Updated 6 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆139Updated 6 years ago
- Automates credential skimming from service accounts in Windows Registry☆75Updated 4 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆169Updated last year
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆144Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- Simulating Adversary Operations☆92Updated 6 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 7 years ago
- ☆92Updated 6 years ago
- Automated Tactics Techniques & Procedures☆252Updated last year
- ☆82Updated 4 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118Updated 5 years ago
- This project is just a dumping ground for random scripts I've developed.☆137Updated 6 months ago
- All the Power with no Shell☆36Updated 3 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆131Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- Liniaal - A communication extension to Ruler☆97Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Updated 5 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- initial commit☆43Updated 2 months ago
- ☆98Updated 5 years ago
- Proof of Concept exploit for CVE-2017-8570☆187Updated 7 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- Active Directory enumeration from non-domain system.☆118Updated 8 years ago