nickvourd / CS-Aggressor-KitLinks
Homemade Aggressor scripts kit for Cobalt Strike
☆76Updated last month
Alternatives and similar repositories for CS-Aggressor-Kit
Users that are interested in CS-Aggressor-Kit are comparing it to the libraries listed below
Sorting:
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆41Updated 10 months ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆174Updated last month
- A Tool that aims to evade av with binary padding☆154Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆246Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆54Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆206Updated 2 years ago
- Help red teams find opsec processes during engagements☆42Updated 9 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Updated last year
- ☆57Updated last year
- ☆81Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆149Updated 11 months ago
- Execute commands in other Sessions☆90Updated last year
- Test bench lab for Shellcode Obfuscation☆29Updated last week
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆100Updated 2 months ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆199Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆113Updated last year
- A C# port from Invoke-GhostTask☆118Updated last year
- Silently Install Chrome Extension For Persistence☆92Updated last year
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆127Updated last month
- TeamServer and Client of Exploration Command and Control Framework☆157Updated last week
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆137Updated 2 years ago
- ☆88Updated 2 years ago
- A simple Sleepmask BOF example☆133Updated 3 months ago
- CVE-2024-40711-exp☆42Updated 10 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆141Updated 5 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆50Updated last year
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆46Updated this week
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- ☆220Updated last year
- ☆230Updated last year