vysecurity / checkO365Links
checkO365 is a tool to check if a target domain is using O365
☆84Updated 7 years ago
Alternatives and similar repositories for checkO365
Users that are interested in checkO365 are comparing it to the libraries listed below
Sorting:
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- Malleable C2 profiles for Cobalt Strike☆74Updated 3 years ago
- CobaltStrike External C2 for Websockets☆197Updated 6 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆145Updated 5 years ago
- ☆210Updated 6 years ago
- Exports Kerberos KrbCred Tickets for use in Mimikatz/Beacon from a Kerberos CCache File☆90Updated 10 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 8 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Updated 7 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆132Updated 7 years ago
- Parse NTLM challenge messages over HTTP and SMB☆151Updated 2 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Updated 5 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53Updated 6 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 7 months ago
- Contains poc's and my research works☆31Updated 2 years ago
- Cobalt Strike SCT payload obfuscator☆144Updated 8 years ago
- Cobalt Strike Aggressor Scripts☆143Updated 10 months ago
- cve-2019-0604 SharePoint RCE exploit☆100Updated 5 years ago
- Splunk Dashboard for CobaltStrike logs☆89Updated 4 years ago
- CoffeeShot: Avoid Detection with Memory Injection☆75Updated 7 years ago
- Ex-pv8's☆64Updated 6 years ago
- CVE-2019-0604☆133Updated 6 years ago
- ☆73Updated 8 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Updated 6 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 7 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆171Updated 7 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Updated 7 years ago