manves / TaoWu-Cobalt-Strike-English
☆16Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for TaoWu-Cobalt-Strike-English
- ☆51Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆26Updated 3 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- Encrypting shellcode to Bypass AV☆70Updated 5 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆79Updated last year
- AutoStart teamserver and listeners with services☆69Updated 2 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆24Updated 2 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆133Updated 2 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆58Updated 2 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆40Updated 7 months ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆62Updated 4 months ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆60Updated 3 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆52Updated 2 years ago
- A Golang implant that uses Discord as a C2 team server☆64Updated last year
- This project is an AES loader for c2 shellcode☆15Updated 9 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆62Updated 2 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 4 years ago
- C# binary with embeded golang hack-browser-data☆95Updated 2 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆49Updated 4 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Updated 3 years ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆126Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆72Updated last year
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆42Updated 2 years ago
- Winsocket for Cobalt Strike.☆98Updated last year
- ☆77Updated last year
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆53Updated 7 months ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆23Updated 2 years ago