sec-consult / aggrokatzLinks
Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it to parse LSASS dump files and registry hive files to extract credentials and other secrets stored without downloading the file and without uploading any suspicious code to the beacon.
☆158Updated 4 years ago
Alternatives and similar repositories for aggrokatz
Users that are interested in aggrokatz are comparing it to the libraries listed below
Sorting:
- Extendable payload obfuscation and delivery framework☆145Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- A little tool to play with Outlook☆207Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆157Updated 4 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Updated 3 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆184Updated 4 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆115Updated 4 years ago
- C# tool to discover low hanging fruits☆95Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 4 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Updated 7 months ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆142Updated 4 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆234Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆188Updated 2 months ago
- CVE-2021-40444☆65Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆130Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- ☆135Updated 4 years ago
- Remotely enables Restricted Admin Mode☆213Updated 4 years ago
- ☆94Updated 2 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆249Updated 4 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆234Updated 3 years ago
- Spray a hash via smb to check for local administrator access☆143Updated 4 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago