truekonrads / bigear
Opening CobaltStrike to a wider world
☆8Updated 6 years ago
Alternatives and similar repositories for bigear:
Users that are interested in bigear are comparing it to the libraries listed below
- Useful Windows and AD tools☆15Updated 2 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Mainframe bruter and screen automation utility.☆19Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- HoneyDB Python Module☆13Updated 11 months ago
- Python crawler for remote Windows shares☆13Updated 9 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Cobalt Strike log state tracking, parsing, and storage☆22Updated 5 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- ☆24Updated 6 years ago
- ☆17Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 2 months ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Scripts for automating actions in Cobalt Strike☆11Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Custom scripts used during the scenario☆21Updated 3 years ago
- AV Bypass☆29Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated 2 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Oracle Attacks Tool☆13Updated 8 years ago