misterch0c / BeaconTelegramLinks
Send message on Telegram when you get a new Cobalt Strike beacon
☆21Updated 5 years ago
Alternatives and similar repositories for BeaconTelegram
Users that are interested in BeaconTelegram are comparing it to the libraries listed below
Sorting:
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 5 years ago
- Aggressor Script to Execute Assemblies from Github☆71Updated 4 years ago
- Bypass AMSI and Defender using Ordinal Values☆42Updated 5 years ago
- POC code to crash Windows Event Logger Service☆27Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Updated 4 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆37Updated 6 years ago
- SqlServer Linked Password Dumper.☆16Updated 8 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Obtain and parse SSL certificates☆10Updated 3 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Updated 3 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Updated 6 years ago
- Playing around with token manipulation in C#.☆28Updated 5 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated 2 years ago
- Tool to manage user privileges☆29Updated 5 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆29Updated 2 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 6 years ago
- C# .NET Assembly for interacting with File Object DACLs☆44Updated 5 years ago
- C# .NET Assembly to perform LDAP Queries☆26Updated 4 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆73Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago