truekonrads / bigearLinks
Opening CobaltStrike to a wider world
☆8Updated 7 years ago
Alternatives and similar repositories for bigear
Users that are interested in bigear are comparing it to the libraries listed below
Sorting:
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Scripts for automating actions in Cobalt Strike☆11Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- ☆30Updated 6 years ago
- ☆25Updated 6 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Mainframe bruter and screen automation utility.☆20Updated 3 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- ☆19Updated 8 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- ☆17Updated 7 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆16Updated 6 years ago
- AV Bypass☆29Updated 7 years ago
- ☆11Updated 9 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Library of traffic redirectors☆26Updated 5 years ago