vysecurity / Aggressor-VYSECLinks
☆211Updated 6 years ago
Alternatives and similar repositories for Aggressor-VYSEC
Users that are interested in Aggressor-VYSEC are comparing it to the libraries listed below
Sorting:
- A collection of useful scripts for Cobalt Strike☆173Updated last year
- Collection of Aggressor Scripts for Cobalt Strike☆173Updated 7 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆184Updated last year
- A library for integrating communication channels with the Cobalt Strike External C2 server☆289Updated 8 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆134Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆242Updated 2 years ago
- CobaltStrike External C2 for Websockets☆197Updated 6 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 8 years ago
- Malleable C2 profiles for Cobalt Strike☆75Updated 3 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆126Updated 10 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Updated 7 years ago
- Various Aggressor Scripts I've Created.☆151Updated 4 years ago
- Lateral Movement technique using DCOM and HTA☆235Updated 3 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 10 months ago
- ☆73Updated 8 years ago
- Cobalt Strike Aggressor Scripts☆143Updated last year
- initial commit☆174Updated 7 years ago
- CVE-2018-8581☆376Updated 3 years ago
- POC for Cobalt Strike external C2☆141Updated 4 years ago
- Parse NTLM challenge messages over HTTP and SMB☆149Updated 3 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆156Updated 6 years ago
- ntlm relay attack to Exchange Web Services☆334Updated 7 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- Check if MS-RPRN is remotely available with powershell/c#☆179Updated 7 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆155Updated 7 years ago
- Constrained Language Mode + AMSI bypass all in one☆160Updated 6 years ago
- ☆198Updated 5 years ago
- checkO365 is a tool to check if a target domain is using O365☆87Updated 7 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆306Updated 3 years ago
- Discover Printers☆169Updated 6 years ago