Cobalt Strike Aggressor Script Collection
☆19Mar 30, 2018Updated 7 years ago
Alternatives and similar repositories for CSASC
Users that are interested in CSASC are comparing it to the libraries listed below
Sorting:
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- All TMF files that I extracted from Microsoft PDBs.☆14Jun 29, 2019Updated 6 years ago
- Looks up permissions within Active Directory on a target (OU or Computer) to determine access to LAPS attributes (ms-Mcs-AdmPwdExpiration…☆16May 31, 2023Updated 2 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- ☆21Jul 28, 2020Updated 5 years ago
- Build a Jekyll blog in minutes, without touching the command line.☆16Dec 6, 2018Updated 7 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated 10 months ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Dump objects from .NET dumps.☆51Apr 19, 2022Updated 3 years ago
- ☆28Sep 1, 2023Updated 2 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- ☆27Jul 25, 2025Updated 7 months ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- ☆25Jan 16, 2026Updated last month
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆28Jul 4, 2020Updated 5 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- ☆121Jan 7, 2026Updated last month
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- A repository of example VBA stomped documents☆28May 1, 2019Updated 6 years ago
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆76Mar 13, 2025Updated 11 months ago