cobalt-arsenal
WinPwn
cobalt-arsenal | WinPwn | |
---|---|---|
2 | 1 | |
979 | 3,190 | |
- | - | |
0.0 | 5.3 | |
about 1 year ago | 3 months ago | |
PowerShell | PowerShell | |
MIT License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cobalt-arsenal
WinPwn
What are some alternatives?
cobaltstrike-headless - Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.
reconness - ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
PoshC2 - A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
PowerShellKeePass - PowerShell 5 module for KeePass manipulation
RedTeaming-Tactics-and-Techniques - Red Teaming Tactics and Techniques
CVE-2021-1675 - C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
UltimateAppLockerByPassList - The goal of this repository is to document the most common techniques to bypass AppLocker.
CVE-2021-1675 - Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
RIP - Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++.
PowerShell - PowerShell scripts for Mick's IT Blogs
nishang - Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
laravel-system-helpers - Scripts for making basic Laravel project setup more convenient with OS-native utilities (PowerShell and Bash)