mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-12-22 17:15:06 +01:00
Added cobalt-arsenal
This commit is contained in:
parent
8af93e36e3
commit
a787eb7740
3
.gitmodules
vendored
3
.gitmodules
vendored
@ -37,3 +37,6 @@
|
||||
[submodule "red-teaming/malleable_redirector/proxy2"]
|
||||
path = red-teaming/malleable_redirector/proxy2
|
||||
url = https://github.com/mgeeky/proxy2.git
|
||||
[submodule "red-teaming/cobalt-arsenal"]
|
||||
path = red-teaming/cobalt-arsenal
|
||||
url = https://github.com/mgeeky/cobalt-arsenal.git
|
||||
|
@ -44,6 +44,8 @@ FullLanguage
|
||||
|
||||
- **`clickOnceSharpPickTemplate.cs`** - This is a template for **C# Console Project** containing [SharpPick](https://github.com/PowerShellEmpire/PowerTools/tree/master/PowerPick) technique of loading Powershell code from within C# application. The ClickOnce concept is to generate a windows self-updating Application that is specially privileged ([ClickOnce](https://www.slideshare.net/NetSPI/all-you-need-is-one-a-click-once-love-story-secure360-2015))
|
||||
|
||||
- **cobalt-arsenal** - A set of my published Cobalt Strike 4.0+ compatible aggressor scripts. That includes couple of my handy utils I've used on various engagements.
|
||||
|
||||
- **`compressedPowershell.py`** - Creates a Powershell snippet containing GZIP-Compressed payload that will get decompressed and executed (IEX)
|
||||
. ([gist](https://gist.github.com/mgeeky/e30ceecc2082a11b99c7b24b42bd77fc))
|
||||
|
||||
|
1
red-teaming/cobalt-arsenal
Submodule
1
red-teaming/cobalt-arsenal
Submodule
@ -0,0 +1 @@
|
||||
Subproject commit 31c89fb2d82c9a2d2cdbf877344249afa2c58877
|
Loading…
Reference in New Issue
Block a user