threatexpress / cobaltstrike_payload_generator
Quickly generate every payload type for each listener and optionally host via HTTP.
☆16Updated 3 years ago
Related projects: ⓘ
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆26Updated last year
- ☆13Updated this week
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- ☆17Updated this week
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 3 years ago
- A simple injector that uses LoadLibraryA☆15Updated 4 years ago
- Very Easy Relative Backdoor Application☆12Updated 3 years ago
- Recon-ng modules for basic OSINT.☆9Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 2 years ago
- ☆14Updated this week
- C2 and Post Exploitation Code☆34Updated 2 weeks ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆12Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆42Updated 2 years ago
- Execute embedded Mimikatz☆13Updated 2 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆26Updated 4 years ago
- One gate to all syscalls!☆23Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆19Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆21Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Compiled Binaries for Sharp Suite☆12Updated 4 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆22Updated 2 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆13Updated 2 years ago