harleyQu1nn / csfmView external linksLinks
Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.
☆46Nov 22, 2017Updated 8 years ago
Alternatives and similar repositories for csfm
Users that are interested in csfm are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- ☆17Dec 1, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- PowerDNS: Powershell DNS Delivery☆215Sep 26, 2018Updated 7 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- ☆80Nov 2, 2019Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆322Jun 5, 2017Updated 8 years ago
- A collection of useful scripts for Cobalt Strike☆172Aug 15, 2024Updated last year
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- Search for categorized domain☆453Jan 15, 2019Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆230May 10, 2018Updated 7 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆172Aug 8, 2018Updated 7 years ago
- ☆273Jul 26, 2022Updated 3 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,529Jun 30, 2023Updated 2 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Aug 27, 2018Updated 7 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 7 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago