LOLDrivers
Covenant
LOLDrivers | Covenant | |
---|---|---|
5 | 10 | |
900 | 4,018 | |
4.1% | - | |
9.0 | 0.0 | |
about 1 month ago | about 1 year ago | |
YARA | C# | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
LOLDrivers
-
Effective Adversary Emulation
Bring your own vulnerable driver (BYOVD): https://www.loldrivers.io/
-
LOLBAS: Living Off the Land Binaries, Scripts and Libraries
win drivers https://www.loldrivers.io/
- Lolbas: Living Off the Land Binaries, Scripts and Libraries
-
Chinese hacker, Volt Typhoon, breach US critical infrastructure in stealthy attacks
You can also use trusted drivers that are known to touch lsass: https://www.loldrivers.io
- YARA rule generator for LOLDrivers
Covenant
-
Effective Adversary Emulation
Covenant C2: https://github.com/cobbr/Covenant
-
Secure authentication over unencrypted connection
E.g., https://github.com/cobbr/Covenant/blob/master/Covenant/Data/Grunt/GruntHTTP/GruntHTTP.cs
- Next stage of training
-
Covenant Framework and .NET framework issues
And I have then installed Covenant as per the instructions here: https://github.com/cobbr/Covenant/wiki/Installation-And-Startup
-
A question about internal(network?) pentesting.
https://github.com/cobbr/Covenant https://bloodhoundgang.herokuapp.com/ https://github.com/cobbr/Covenant/wiki
-
Ask HN: Ever lost your love for coding? How did you get it back?
1. Learn to build things
2. Learn to hack them
3. Build tools to hack things (or learn existing ones, e.g. https://github.com/GhostPack and https://github.com/cobbr/Covenant for you .NET folks)
Going from business apps to tools offers a nice change of pace.
-
Guidance on certs in Cybersecurity Field
Covenant: https://github.com/cobbr/Covenant
-
"Modern" Pentest Frameworks
Thanks I will give the README a read https://github.com/cobbr/Covenant
- Microsoft / Github should stop treating open-source software as malware and forcing developers to pay for certificates, if they actually care about open-source developers
-
DomainBorrowing: Not be confused with DomainFronting - This talk presents a new method to hide C2 traffic via a CDN to circumvent censorship. It details some tricks discovered in some CDN implementations, and how to chain them together to “borrow” a domain and its valid HTTPS certificate
an implementation is here - Covenant Implant Template, which uses Domain Borrowing for C2 communication. https://github.com/Dliv3/DomainBorrowing
What are some alternatives?
nvidia-patch - This patch removes restriction on maximum number of simultaneous NVENC video encoding sessions imposed by Nvidia to consumer-grade GPUs.
Metasploit - Metasploit Framework
little-snitch-blocklist - 🛡 A malicious URL blocklist that protects you from advertisements, malwares, spams, statistics & trackers on both web browsing and applications.
Empire - Empire is a PowerShell and Python post-exploitation agent.
LOLBAS - Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Empire - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
teardrop - Open-Source Ransomware Project for learning purpose only written in C# (csharp). Dont use it for bad things.
caldera - Automated Adversary Emulation Platform
MacOSThreatTrack - Bash tool used for proactive detection of malicious activity on macOS systems.
Starkiller - Starkiller is a Frontend for PowerShell Empire.
MAL-CL - MAL-CL (Malicious Command-Line)
SILENTTRINITY - An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR