mhaskar / MalleableC2-ProfilesLinks
A collection of Cobalt Strike Malleable C2 profiles
☆35Updated 5 years ago
Alternatives and similar repositories for MalleableC2-Profiles
Users that are interested in MalleableC2-Profiles are comparing it to the libraries listed below
Sorting:
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆29Updated 6 years ago
- .NET 4.0 Fast Directory / File Lister☆27Updated 5 years ago
- AutoStart teamserver and listeners with services☆75Updated 3 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 5 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 4 years ago
- A little scanner to check the LDAP Signing state☆46Updated 4 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆19Updated 4 years ago
- Caeser Cipher your shellcode!☆21Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 5 years ago
- ☆71Updated 5 years ago
- Cobalt Strike Get clipboard plugin☆15Updated 2 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Updated 4 years ago
- A simple BOF implementation of klist using Windows API☆32Updated 3 years ago
- Beacon Object Files.☆37Updated last year
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Updated 4 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Updated 3 years ago
- Collection of self-made Red Team tools that have come in handy☆12Updated last year
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆84Updated 2 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 4 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆65Updated 2 years ago
- ☆31Updated 3 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25Updated 3 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Updated 2 years ago