Cobalt Strike Aggressor script create for RTO
☆16Apr 11, 2024Updated last year
Alternatives and similar repositories for RTO_Aggressor_Script
Users that are interested in RTO_Aggressor_Script are comparing it to the libraries listed below
Sorting:
- ☆10Jul 16, 2025Updated 7 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 2 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- 学习笔记☆13Mar 4, 2022Updated 3 years ago
- A C# Source Generator for obfuscating string or byte array values using multi-byte xor encryption.☆14Jun 12, 2024Updated last year
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 7 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Shellcode Loader / bypass *60、*rong☆16Dec 1, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆22Nov 28, 2024Updated last year
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- ☆83Nov 1, 2023Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆21Sep 3, 2020Updated 5 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61May 24, 2022Updated 3 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆28Aug 24, 2023Updated 2 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated 3 weeks ago
- Malware?☆77Oct 26, 2025Updated 4 months ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Jun 22, 2020Updated 5 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆41Dec 12, 2025Updated 2 months ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆85Nov 20, 2022Updated 3 years ago