cobalt strike 自用脚本
☆29Oct 29, 2020Updated 5 years ago
Alternatives and similar repositories for AggressorScripts
Users that are interested in AggressorScripts are comparing it to the libraries listed below
Sorting:
- 通过burp代理流量寻找shiro站点☆60Jun 11, 2020Updated 5 years ago
- Web ExternalC2 Demo☆52Aug 18, 2020Updated 5 years ago
- cs4.0 cs 4.1 beacon加解密☆25Mar 29, 2021Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- 几条关于CVE-2020-15148(yii2反序列化)的绕过☆75Sep 21, 2020Updated 5 years ago
- Xray 被动扫描管理☆59May 1, 2020Updated 5 years ago
- 对密文的加密类型进行判断的命令行工具。☆61Jun 21, 2019Updated 6 years ago
- 雇一位免费的360工程师和一位长亭工程师为你挖洞,还有听话的server酱给你汇报☆193Apr 12, 2020Updated 5 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Jul 17, 2020Updated 5 years ago
- 通过NetSessionEnum获取域内机器对应用户☆67May 6, 2020Updated 5 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- 远程内存加载Python模块☆21Sep 12, 2019Updated 6 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- 内网渗透中快速获取数据库所有库名,表名,列名。具体判断后再去翻数据,节省时间。适用于mysql,mssql。☆197Nov 11, 2019Updated 6 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆98Jul 10, 2020Updated 5 years ago
- c# 读取登录过本机的登录失败或登录成功(4624,4625 )的所有计算机信息,在内网渗透中快速定位运维管理人员。☆206Oct 15, 2019Updated 6 years ago
- 本项目是一篇NTLM中高级进阶进阶文章,后续我也会在Github和Gitbook对此文进行持续性的更新NTLM以及常见的协议中高级进阶并计划开源部分协议调试工具,望各位issue勘误。☆113Jul 10, 2020Updated 5 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- Windows 7/2008 R2 EoP☆13Feb 12, 2021Updated 5 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 5 years ago
- anti AV☆292Mar 12, 2020Updated 5 years ago
- 将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术。☆521Jul 9, 2020Updated 5 years ago
- Remote PC control (Windows Platform). || PC远程控制(Windows平台)。☆51Jul 5, 2020Updated 5 years ago
- 修改frp支持域前置与配置文件自删除☆397Dec 31, 2020Updated 5 years ago
- 读取登录过本机的登录失败或登录成功的所有计算机信息,在内网渗透中快速定位运维管理人员。☆221Sep 30, 2019Updated 6 years ago
- collect☆17Aug 29, 2019Updated 6 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Weblogic RCE with IIOP☆80Jan 18, 2020Updated 6 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆46Jun 28, 2020Updated 5 years ago
- OXID_Find by C++(多线程) 通过OXID解析器获取Windows远程主机上网卡地址☆89Jul 19, 2020Updated 5 years ago
- CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)☆43May 26, 2020Updated 5 years ago
- A Zhiyuan OA Collaborative Office Remote Code Execution Vulnerability on Windows☆37Jun 27, 2019Updated 6 years ago
- 内网渗透中常用的c#程序整合成cs脚本,直接内存加载。持续更新~☆498Feb 13, 2020Updated 6 years ago
- POC-T强化版本 POC-S , 用于红蓝对抗中快速验证Web应用漏洞, 对功能进行强化以及脚本进行分类添加,自带dnslog等, 平台补充来自vulhub靶机及其他开源项目的高可用POC☆357Mar 12, 2020Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago