sec-consult / aggrokatz
Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it to parse LSASS dump files and registry hive files to extract credentials and other secrets stored without downloading the file and without uploading any suspicious code to the beacon.
☆156Updated 3 years ago
Alternatives and similar repositories for aggrokatz:
Users that are interested in aggrokatz are comparing it to the libraries listed below
- Extendable payload obfuscation and delivery framework☆141Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆190Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆140Updated 3 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆322Updated 2 years ago
- Simple rapper for Mimikatz, bypass Defender☆139Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆111Updated 2 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆86Updated 3 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Updated 2 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆184Updated 3 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Updated 2 years ago
- C# version of Powermad☆158Updated last year
- Remotely enables Restricted Admin Mode☆206Updated 3 years ago
- My CobaltStrike BOFS☆160Updated 2 years ago
- Exploiting CVE-2021-44228 in vCenter for remote code execution and more.☆104Updated 3 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆168Updated 5 years ago
- Beacon Object File PoC implementation of KillDefender☆217Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆125Updated last year
- Spray a hash via smb to check for local administrator access☆140Updated 3 years ago
- Agressor script that lists available Cobalt Strike beacon commands and colors them based on their type☆196Updated 10 months ago
- Bypassing AppLocker with C#☆136Updated 3 years ago
- DLL Hijack Search Order Enumeration BOF☆141Updated 3 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆145Updated 4 years ago
- ☆159Updated 2 years ago