SILENTTRINITY
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR (by byt3bl33d3r)
bzar
A set of Zeek scripts to detect ATT&CK techniques. (by mitre-attack)
SILENTTRINITY | bzar | |
---|---|---|
2 | 1 | |
2,230 | 585 | |
1.3% | 1.4% | |
3.4 | 1.4 | |
over 1 year ago | 10 months ago | |
Boo | Zeek | |
GNU General Public License v3.0 only | BSD 3-clause "New" or "Revised" License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
SILENTTRINITY
Posts with mentions or reviews of SILENTTRINITY.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-10-11.
- Guidance on certs in Cybersecurity Field
-
Cobalt Strike detection
You're certainly right that it doesn't need an XML extension. But it also frequently will due to many tools using it by default (e.g. line 13 in https://github.com/byt3bl33d3r/SILENTTRINITY/blob/master/silenttrinity/core/teamserver/stagers/msbuild.py).
bzar
Posts with mentions or reviews of bzar.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-10-11.
What are some alternatives?
When comparing SILENTTRINITY and bzar you can also consider the following projects:
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
caldera_pathfinder - Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
Atomic-Red-Team-C2 - ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Starkiller - Starkiller is a Frontend for PowerShell Empire.
Empire - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.