jordanpotti / opsec-aggressor
Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.
☆21Updated 3 years ago
Alternatives and similar repositories for opsec-aggressor:
Users that are interested in opsec-aggressor are comparing it to the libraries listed below
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆29Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆35Updated 4 months ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆25Updated last year
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆27Updated 4 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆24Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 9 months ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆25Updated 7 months ago
- ☆20Updated 2 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ☆2Updated 3 months ago
- Purple Team Dropper generator using open source templates.☆14Updated 9 months ago
- Threadless Injection Payload Toolkit☆12Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- Bunch of BOF files☆30Updated 3 months ago
- Smuggle a file to a user's browser☆19Updated 2 years ago
- ☆16Updated 5 months ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- Dump Teams conversations☆18Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12Updated 3 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- A care package of useful bofs for red team engagments☆54Updated 3 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago