mobdk / CopyCatLinks
Simple rapper for Mimikatz, bypass Defender
☆140Updated 3 years ago
Alternatives and similar repositories for CopyCat
Users that are interested in CopyCat are comparing it to the libraries listed below
Sorting:
- Koppeling x Metatwin x LazySign☆213Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆299Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆302Updated last year
- Beacon Object File PoC implementation of KillDefender☆227Updated 3 years ago
- C# version of Powermad☆166Updated last year
- DLL Hijack Search Order Enumeration BOF☆147Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆243Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆272Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆231Updated 3 years ago
- Extendable payload obfuscation and delivery framework☆144Updated 2 years ago
- UI for creating LNKs☆104Updated 4 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆207Updated last year
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆256Updated 2 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- POC tools for exploring SMB over QUIC protocol☆125Updated 3 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆115Updated 3 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆328Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- Remotely enables Restricted Admin Mode☆210Updated 3 years ago
- ☆126Updated 2 years ago
- Source for tasks I have used with Covenant☆120Updated 4 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆151Updated 4 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆186Updated 2 years ago
- ☆93Updated 2 years ago