threatexpress / cobaltstrike_payload_generatorLinks
Quickly generate every payload type for each listener and optionally host via HTTP.
☆22Updated 3 years ago
Alternatives and similar repositories for cobaltstrike_payload_generator
Users that are interested in cobaltstrike_payload_generator are comparing it to the libraries listed below
Sorting:
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆28Updated last year
- ☆18Updated 6 months ago
- ☆19Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 4 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆18Updated 4 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆29Updated 5 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 11 months ago
- Tomcat backdoor based on CS blog☆27Updated last year
- ☆12Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆15Updated 3 years ago
- Cobalt Strike Aggressor scripts☆9Updated 2 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆9Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆21Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- ☆17Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- ☆12Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 10 months ago
- Citrix Phishlet☆24Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 3 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago