vysecurity / checkO365Links
checkO365 is a tool to check if a target domain is using O365
☆87Updated 7 years ago
Alternatives and similar repositories for checkO365
Users that are interested in checkO365 are comparing it to the libraries listed below
Sorting:
- Malleable C2 profiles for Cobalt Strike☆75Updated 3 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- ☆210Updated 7 years ago
- CobaltStrike External C2 for Websockets☆197Updated 6 years ago
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 8 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆145Updated 5 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Updated 7 years ago
- Exports Kerberos KrbCred Tickets for use in Mimikatz/Beacon from a Kerberos CCache File☆89Updated 10 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 11 months ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 6 years ago
- Abusing Exchange via EWS☆152Updated 5 years ago
- Splunk Dashboard for CobaltStrike logs☆90Updated 4 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 8 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆134Updated 7 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- Cobalt Strike SCT payload obfuscator☆143Updated 8 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 6 years ago
- Cobalt Strike Aggressor Scripts☆143Updated last year
- A collection of useful scripts for Cobalt Strike☆172Updated last year
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Updated 5 years ago
- Contains poc's and my research works☆31Updated 2 years ago
- Ex-pv8's☆64Updated 6 years ago
- Use Waitfor.exe to maintain persistence☆55Updated 4 years ago
- CVE-2019-0604☆133Updated 6 years ago
- ☆73Updated 8 years ago
- POC for Cobalt Strike external C2☆142Updated 4 years ago
- PowerView menu for Cobalt Strike☆70Updated 7 years ago
- ☆198Updated 5 years ago