whickey-r7 / grab_beacon_configLinks
☆452Updated 4 years ago
Alternatives and similar repositories for grab_beacon_config
Users that are interested in grab_beacon_config are comparing it to the libraries listed below
Sorting:
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆371Updated 3 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆269Updated 4 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆913Updated 3 years ago
- ☆1,081Updated last year
- Detect and respond to Cobalt Strike beacons using ETW.☆504Updated 3 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆935Updated 11 months ago
- Scan installed EDRs and AVs on Windows☆586Updated last month
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- .NET Project for Attacking vCenter☆544Updated 3 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆607Updated 2 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆354Updated 4 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆523Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,080Updated last year
- Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.…☆834Updated 2 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆333Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆756Updated 4 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆490Updated 5 years ago
- Cobalt Strike random C2 Profile generator☆663Updated 2 years ago
- Amplify network visibility from multiple POV of other hosts☆304Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆709Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆611Updated 3 years ago
- Evade sysmon and windows event logging☆626Updated 5 years ago
- ☆294Updated last year
- Cobalt Strike kit for Persistence☆477Updated 5 years ago
- Beta versions of my software☆259Updated last month
- Cobalt Strike kit for Lateral Movement☆672Updated 5 years ago
- ☆547Updated last year
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆447Updated 2 years ago
- Defences against Cobalt Strike☆1,286Updated 3 years ago
- Cobalt Strike Python API☆300Updated 3 years ago