Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container
☆27Oct 24, 2021Updated 4 years ago
Alternatives and similar repositories for Docker-C3
Users that are interested in Docker-C3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- My CobaltStrike BOFS☆167Jul 23, 2022Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 6 years ago
- ☆110May 14, 2018Updated 7 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated last month
- Java XMLDecoder payload generator☆16Jul 27, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- ☆19Mar 16, 2021Updated 5 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- ☆52Dec 11, 2019Updated 6 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆73Oct 24, 2021Updated 4 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- My doodles as I learn C#☆76Sep 6, 2020Updated 5 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆272Jun 13, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- PoC for UUID shellcode execution using DInvoke☆155Mar 8, 2021Updated 5 years ago
- ☆18Jan 20, 2021Updated 5 years ago
- ☆164Apr 25, 2022Updated 3 years ago