Serving files with conditions, serverside keying and more.
☆18May 26, 2022Updated 3 years ago
Alternatives and similar repositories for RedFile
Users that are interested in RedFile are comparing it to the libraries listed below
Sorting:
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Splunk Dashboard for CobaltStrike logs☆90Mar 16, 2021Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- Aggressor Scripts for Cobalt Strike☆76Mar 9, 2024Updated last year
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Feb 23, 2018Updated 8 years ago
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 8 years ago
- ☆166Feb 13, 2020Updated 6 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆121Sep 14, 2021Updated 4 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆170Aug 10, 2020Updated 5 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Jul 10, 2018Updated 7 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Mar 31, 2018Updated 7 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 2 months ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆144Oct 31, 2017Updated 8 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆186Dec 5, 2022Updated 3 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆172Aug 8, 2018Updated 7 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated last month
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 3 months ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Assorted scripts and one off things☆270Aug 20, 2024Updated last year
- Rapid Attack Infrastructure (RAI)☆310Nov 24, 2024Updated last year
- ☆98Feb 21, 2019Updated 7 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆325Apr 26, 2020Updated 5 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆241Mar 22, 2023Updated 2 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago