nccgroup / pybeacon
A collection of scripts for dealing with Cobalt Strike beacons in Python
☆168Updated 4 years ago
Alternatives and similar repositories for pybeacon:
Users that are interested in pybeacon are comparing it to the libraries listed below
- Scripts for performing and detecting parent PID spoofing☆144Updated 4 years ago
- ☆148Updated 4 years ago
- ☆190Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆260Updated 3 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆145Updated 4 years ago
- (kinda) Malicious Outlook Reader☆134Updated 4 years ago
- Load any Beacon Object File using Powershell!☆249Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆161Updated 5 months ago
- ☆112Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆255Updated 3 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆268Updated last year
- Executes position independent shellcode from an encrypted zip☆302Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆174Updated 4 years ago
- Evading WinDefender ATP credential-theft☆254Updated 5 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆127Updated 9 months ago
- Toolset for research malware and Cobalt Strike beacons☆208Updated last week
- Tool for interacting with outlook interop during red team engagements☆143Updated 3 years ago
- Cobalt Strike Beacon Object Files☆160Updated 2 years ago
- Proxy Unix applications in the terminal☆114Updated 3 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆340Updated 4 years ago
- ☆162Updated 2 years ago
- Petaq - Purple Team Command & Control Server☆103Updated 2 years ago
- Spray a hash via smb to check for local administrator access☆139Updated 4 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆262Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆172Updated 6 months ago
- ☆166Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 3 years ago
- Run shellcode from resource☆254Updated 4 years ago