SILENTTRINITY
Starkiller
SILENTTRINITY | Starkiller | |
---|---|---|
2 | 2 | |
2,135 | 1,264 | |
- | 1.2% | |
3.4 | 8.1 | |
5 months ago | 2 months ago | |
Boo | Vue | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
SILENTTRINITY
- Guidance on certs in Cybersecurity Field
-
Cobalt Strike detection
You're certainly right that it doesn't need an XML extension. But it also frequently will due to many tools using it by default (e.g. line 13 in https://github.com/byt3bl33d3r/SILENTTRINITY/blob/master/silenttrinity/core/teamserver/stagers/msbuild.py).
Starkiller
-
Guidance on certs in Cybersecurity Field
StarKiller: https://github.com/BC-SECURITY/Starkiller
- Releases ยท BC-SECURITY/Starkiller
What are some alternatives?
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
Empire - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
bzar - A set of Zeek scripts to detect ATT&CK techniques.
Awesome-Red-Teaming - List of Awesome Red Teaming Resources
Atomic-Red-Team-Intelligence-C2 - ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Empire - Empire is a PowerShell and Python post-exploitation agent.
caldera - Automated Adversary Emulation Platform
empire - A PaaS built on top of Amazon EC2 Container Service (ECS)
merlin - Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.