Cobalt Strike Aggressor Script Collection
☆19Mar 30, 2018Updated 7 years ago
Alternatives and similar repositories for CSASC
Users that are interested in CSASC are comparing it to the libraries listed below
Sorting:
- ☆23Jul 28, 2020Updated 5 years ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Feb 13, 2023Updated 3 years ago
- ☆27Jul 25, 2025Updated 7 months ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Build a Jekyll blog in minutes, without touching the command line.☆16Dec 6, 2018Updated 7 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated 11 months ago
- ☆28Sep 1, 2023Updated 2 years ago
- The worlds most useless port of a desktop (webpage) mascot☆14Nov 8, 2014Updated 11 years ago
- ☆10Updated this week
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Looks up permissions within Active Directory on a target (OU or Computer) to determine access to LAPS attributes (ms-Mcs-AdmPwdExpiration…☆16May 31, 2023Updated 2 years ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 6 months ago
- BigPhish - An all-in-one solution to identify and monitor phishing kit deployment☆13Dec 31, 2025Updated 2 months ago
- All TMF files that I extracted from Microsoft PDBs.☆14Jun 29, 2019Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆21Nov 6, 2024Updated last year
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆153Jan 7, 2019Updated 7 years ago
- Lateral Movement Bof with MSI ODBC Driver Install☆147Sep 30, 2025Updated 5 months ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- ☆49Apr 9, 2025Updated 11 months ago
- I wrote a C++ project for metasploit or CobaltStrike...login_user:root、pass:jhhua☆12Jan 4, 2022Updated 4 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key - Fully Undetectable (FUD)☆18May 18, 2020Updated 5 years ago