Cobalt Strike Aggressor script create for RTO
☆16Apr 11, 2024Updated last year
Alternatives and similar repositories for RTO_Aggressor_Script
Users that are interested in RTO_Aggressor_Script are comparing it to the libraries listed below
Sorting:
- ☆10Jul 16, 2025Updated 8 months ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- ☆67Nov 10, 2025Updated 4 months ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- Shellcode Loader / bypass *60、*rong☆15Dec 1, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- 学习笔记☆13Mar 4, 2022Updated 4 years ago
- 📕 哔哩哔哩大学,收集哔哩哔哩的学习资源☆12Oct 15, 2023Updated 2 years ago
- A high-performance C++ framework for emulating executable binaries☆128Nov 23, 2025Updated 3 months ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆23Nov 28, 2024Updated last year
- JSBerg is a fast and efficient URL scraper that extracts links, JavaScript files, CSS files, images, and inline URLs from a list of websi…☆23Mar 19, 2025Updated last year
- CTF for beginners guide☆21Aug 31, 2022Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61May 24, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Nuclei templates which I wrote myself☆10Jan 8, 2022Updated 4 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- 一个快速扫描dns域传输漏洞的脚本(ZTdns is a quick script to scan for DNS zone transfer vulnerabilities)☆14Apr 7, 2024Updated last year
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- 一款被动扫描ssrf的burpsuite插件☆21Dec 30, 2022Updated 3 years ago
- Malware?☆77Oct 26, 2025Updated 4 months ago
- A C# Source Generator for obfuscating string or byte array values using multi-byte xor encryption.☆14Jun 12, 2024Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆126Jun 22, 2020Updated 5 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- Create and enumerate hidden desktops.☆91Dec 12, 2023Updated 2 years ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆112Mar 25, 2024Updated last year
- ☆18Sep 27, 2025Updated 5 months ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- AniX - Unofficial Web Client for Anixart, using next.js☆35Jan 10, 2026Updated 2 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago