jfmaes / Ansible-Cobalt-StrikeLinks
An Ansible role to install cobalt-strike
☆16Updated 5 years ago
Alternatives and similar repositories for Ansible-Cobalt-Strike
Users that are interested in Ansible-Cobalt-Strike are comparing it to the libraries listed below
Sorting:
- ☆53Updated 4 years ago
- Get or remove RunMRU values☆59Updated 5 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 4 years ago
- ☆33Updated 5 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆40Updated 6 years ago
- ☆38Updated 4 years ago
- ☆36Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 3 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 5 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- ☆18Updated 4 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆29Updated 5 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- ☆24Updated 5 years ago
- C# port of LogServiceCrash☆46Updated 4 years ago
- ☆48Updated 4 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Updated 3 years ago
- A little scanner to check the LDAP Signing state☆46Updated 4 years ago
- ☆18Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Updated 3 years ago
- ☆25Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- ☆41Updated 6 years ago