gavz / CSASCLinks
Cobalt Strike Aggressor Script Collection
☆19Updated 7 years ago
Alternatives and similar repositories for CSASC
Users that are interested in CSASC are comparing it to the libraries listed below
Sorting:
- Extended Process List (Search functionality)☆29Updated 4 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆26Updated 6 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Updated 3 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Updated last year
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Updated 3 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆37Updated 6 years ago
- ☆12Updated 5 years ago
- ☆26Updated last year
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 4 years ago
- C# port of LogServiceCrash☆46Updated 4 years ago
- aggressor and pycobalt scripts.☆18Updated 4 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Updated last year
- Tool to manage user privileges☆28Updated 5 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Get or remove RunMRU values☆55Updated 5 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- ☆35Updated 4 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆59Updated 2 years ago
- ☆25Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆27Updated 4 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆97Updated 3 years ago