Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)
☆20Feb 16, 2021Updated 5 years ago
Alternatives and similar repositories for Red-Team-Ops
Users that are interested in Red-Team-Ops are comparing it to the libraries listed below
Sorting:
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 3 months ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Oct 9, 2021Updated 4 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- S2-057 poc test☆13Aug 31, 2018Updated 7 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Run python from a single exe☆35May 1, 2022Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- ☆72Aug 2, 2022Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Aug 10, 2020Updated 5 years ago
- ☆119Jun 17, 2021Updated 4 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- Turn your VPS into an attack box☆34Mar 17, 2024Updated last year
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆42Sep 3, 2020Updated 5 years ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Jul 27, 2021Updated 4 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Simple EDR implementation to demonstrate bypass☆181May 27, 2020Updated 5 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 3 years ago
- 黑魔鬼插件☆19Jan 30, 2021Updated 5 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆44Dec 26, 2020Updated 5 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- ☆23May 28, 2021Updated 4 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago