Covenant
caldera
Our great sponsors
Covenant | caldera | |
---|---|---|
10 | 16 | |
3,950 | 5,175 | |
- | 3.0% | |
0.0 | 9.2 | |
about 1 year ago | 8 days ago | |
C# | Python | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Covenant
-
Effective Adversary Emulation
Covenant C2: https://github.com/cobbr/Covenant
-
Secure authentication over unencrypted connection
E.g., https://github.com/cobbr/Covenant/blob/master/Covenant/Data/Grunt/GruntHTTP/GruntHTTP.cs
- Next stage of training
-
Covenant Framework and .NET framework issues
And I have then installed Covenant as per the instructions here: https://github.com/cobbr/Covenant/wiki/Installation-And-Startup
-
A question about internal(network?) pentesting.
https://github.com/cobbr/Covenant https://bloodhoundgang.herokuapp.com/ https://github.com/cobbr/Covenant/wiki
-
Ask HN: Ever lost your love for coding? How did you get it back?
1. Learn to build things
2. Learn to hack them
3. Build tools to hack things (or learn existing ones, e.g. https://github.com/GhostPack and https://github.com/cobbr/Covenant for you .NET folks)
Going from business apps to tools offers a nice change of pace.
-
Guidance on certs in Cybersecurity Field
Covenant: https://github.com/cobbr/Covenant
-
"Modern" Pentest Frameworks
Thanks I will give the README a read https://github.com/cobbr/Covenant
- Microsoft / Github should stop treating open-source software as malware and forcing developers to pay for certificates, if they actually care about open-source developers
-
DomainBorrowing: Not be confused with DomainFronting - This talk presents a new method to hide C2 traffic via a CDN to circumvent censorship. It details some tricks discovered in some CDN implementations, and how to chain them together to “borrow” a domain and its valid HTTPS certificate
an implementation is here - Covenant Implant Template, which uses Domain Borrowing for C2 communication. https://github.com/Dliv3/DomainBorrowing
caldera
-
SOC Malware/Detection lab
Also, for the attack emulation part you might be interested in CALDERA.
- Automated penetration testing software?
-
Endpoint Attack Simulation
Mitre made Caldera to drive this. https://github.com/mitre/caldera
- Testing an XDR solution
-
Do you know the Mitre tool "Caldera"? How can I build a plugin for it?
Did you join the Slack and ask your question there, or on the discussion forum? The CALDERA team will answer... (both links are at https://caldera.mitre.org/)
- New blue team
- Attack simulation tool based on CVE
-
Attack Chain/Exploitation Path Diagram Generation Tools?
There's also a plugin for Caldera (https://github.com/mitre/caldera) called Pathfinder (https://github.com/center-for-threat-informed-defense/caldera_pathfinder and https://www.youtube.com/watch?v=gQRWkHFRG-s) that can help.
- Malware testing service/site for our EDR Testing of SentinelOne
- Worm/ Replicating virus for demonstrating spread/lateral movement through a network.
What are some alternatives?
Metasploit - Metasploit Framework
Empire - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Empire - Empire is a PowerShell and Python post-exploitation agent.
CTF-Difficulty - This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Incident-Playbook - GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
Starkiller - Starkiller is a Frontend for PowerShell Empire.
Ghostwriter - The SpecterOps project management and reporting engine
SILENTTRINITY - An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
WSLab - Azure Stack HCI, Windows 10 and Windows Server rapid lab deployment scripts
empire - A PaaS built on top of Amazon EC2 Container Service (ECS)
can-i-take-over-xyz - "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.