michalkoczwara / aggressor_scripts_collection
Collection of various Aggressor Scripts for Cobalt Strike from awesome people. Will be sure to update this repo with credit to each person.
☆63Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for aggressor_scripts_collection
- Cobalt Strike Aggressor Scripts☆69Updated 4 years ago
- CVE-2020-0688 - Exchange☆66Updated 4 years ago
- ☆155Updated 4 years ago
- ☆77Updated 6 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆78Updated 4 years ago
- ☆93Updated 3 years ago
- SecistSploit☆16Updated 5 years ago
- AggressorScript-UploadAndRunFrp/上传frpc并且运行frpc☆62Updated 5 years ago
- Just pick out the code we need.☆59Updated 5 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆79Updated 5 years ago
- a patched sshd for red team activities☆80Updated 3 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆77Updated 6 years ago
- PowerShell Obfuscator☆16Updated 6 years ago
- just test☆65Updated 2 years ago
- Create a hidden account☆76Updated 7 years ago
- about CobaltStrike☆149Updated 11 months ago
- ☆28Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆57Updated 7 years ago
- Shell say no to NIDS☆71Updated 5 years ago
- Command and Control for C# Writing☆69Updated last year
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 3 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆136Updated 4 years ago
- 通过NetSessionEnum获取域内机器对应用户☆66Updated 4 years ago