zoukankan      html  css  js  c++  java
  • Cobalt Strike插件

    https://github.com/QAX-A-Team/EventLogMaster (日志清除)
    
    https://github.com/harleyQu1nn/AggressorScripts
    https://github.com/bluscreenofjeff/AggressorScripts
    https://github.com/michalkoczwara/aggressor_scripts_collection
    https://github.com/vysecurity/Aggressor-VYSEC
    https://github.com/killswitch-GUI/CobaltStrike-ToolKit
    https://github.com/ramen0x3f/AggressorScripts
    https://github.com/FortyNorthSecurity/AggressorAssessor
    https://github.com/threatexpress/persistence-aggressor-script
    https://github.com/threatexpress/aggressor-scripts
    https://github.com/branthale/CobaltStrikeCNA
    https://github.com/gaudard/scripts/tree/master/red-team/aggressor
    https://github.com/001SPARTaN/aggressor_scripts
    https://github.com/Und3rf10w/Aggressor-scripts
    https://github.com/rasta-mouse/Aggressor-Script
    https://github.com/vysec/Aggressor-VYSEC
    https://github.com/threatexpress/aggressor-scripts
    https://github.com/threatexpress/red-team-scripts
    https://github.com/rsmudge/ElevateKit
    https://github.com/vysec/CVE-2018-4878
    https://github.com/harleyQu1nn/AggressorScripts
    https://github.com/bluscreenofjeff/AggressorScripts
    https://github.com/360-A-Team/CobaltStrike-Toolset
    https://github.com/ars3n11/Aggressor-Scripts
    https://github.com/michalkoczwara/aggressor_scripts_collection
    https://github.com/killswitch-GUI/CobaltStrike-ToolKit
    https://github.com/ZonkSec/persistence-aggressor-script
    https://github.com/rasta-mouse/Aggressor-Script
    https://github.com/RhinoSecurityLabs/Aggressor-Scripts
    https://github.com/Kevin-Robertson/Inveigh
    https://github.com/Genetic-Malware/Ebowla
    https://github.com/001SPARTaN/aggressor_scripts
    https://github.com/gaudard/scripts/tree/master/red-team/aggressor
    https://github.com/branthale/CobaltStrikeCNA
    https://github.com/oldb00t/AggressorScripts
    https://github.com/p292/Phant0m_cobaltstrike
    https://github.com/p292/DDEAutoCS
    https://github.com/secgroundzero/CS-Aggressor-Scripts
    https://github.com/skyleronken/Aggressor-Scripts
    https://github.com/tevora-threat/aggressor-powerview
    https://github.com/tevora-threat/PowerView3-Aggressor
    https://github.com/threatexpress/persistence-aggressor-script
    https://github.com/FortyNorthSecurity/AggressorAssessor
    https://github.com/mdsecactivebreach/CACTUSTORCH
    https://github.com/C0axx/AggressorScripts
    https://github.com/offsecginger/AggressorScripts
    https://github.com/tomsteele/cs-magik
    https://github.com/bitsadmin/nopowershell
    https://github.com/SpiderLabs/SharpCompile
    https://github.com/realoriginal/reflectivepotato
    
  • 相关阅读:
    《Hadoop应用开发技术详解》
    c#中WMI 中的日期和时间转为本地时间
    c# 获取某个进程的CPU使用百分百(类似任务管理器中显示CPU)
    获得特定进程信息
    javascript利用jquery-1.7.1来判断是否是谷歌Chrome浏览器
    Oracle 用Drapper进行like模糊传参查询需要在参数值前后带%符合
    IIS7.0部署MVC/WebApi项目,报404.4错误
    MVC+EF6+Oracle,提示ORA-01918: user '***' does not exist
    MongoDB查询转对象是出错Element '_id' does not match any field or property of class
    MongoDB 导出、导入表
  • 原文地址:https://www.cnblogs.com/nul1/p/12723641.html
Copyright © 2011-2022 走看看