mirror of
				https://github.com/mgeeky/Penetration-Testing-Tools.git
				synced 2025-11-04 04:55:26 +01:00 
			
		
		
		
	Added CobaltSplunk
This commit is contained in:
		
							
								
								
									
										3
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										3
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							@@ -49,3 +49,6 @@
 | 
			
		||||
[submodule "windows/UnhookMe"]
 | 
			
		||||
	path = windows/UnhookMe
 | 
			
		||||
	url = https://github.com/mgeeky/UnhookMe
 | 
			
		||||
[submodule "red-teaming/CobaltSplunk"]
 | 
			
		||||
	path = red-teaming/CobaltSplunk
 | 
			
		||||
	url = https://github.com/mgeeky/CobaltSplunk
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1
									
								
								red-teaming/CobaltSplunk
									
									
									
									
									
										Submodule
									
								
							
							
								
								
								
								
								
							
						
						
									
										1
									
								
								red-teaming/CobaltSplunk
									
									
									
									
									
										Submodule
									
								
							 Submodule red-teaming/CobaltSplunk added at 69cfd3da3d
									
								
							@@ -52,6 +52,8 @@ cmstp.exe /ni /s cmstp.inf
 | 
			
		||||
 | 
			
		||||
- **`cobalt-arsenal`** - A set of my published Cobalt Strike 4.0+ compatible aggressor scripts. That includes couple of my handy utils I've used on various engagements.
 | 
			
		||||
 | 
			
		||||
- **`CobaltSplunk`** - Originally devised by [Vincent Yiu](https://github.com/vysecurity/CobaltSplunk), heavily reworked by me: a Splunk application that ingests, indexes and exposes several search operators to work with Cobalt Strike logs from within of a Splunk interface. Supports Cobalt Strike 4.3+ log files syntax. Gives a lot of flexibility to work with Teamserver log files, search through them, generate insightful reports/dashboards/pivot tables and much more.
 | 
			
		||||
 | 
			
		||||
- [**`code-exec-templates`**](https://github.com/mgeeky/Penetration-Testing-Tools/tree/master/red-teaming/code-exec-templates) - a small collection of template/backbone files for various code-execution techniques (VBScript/JScript embedded in HTA/SCT/XSL/VBS/JS)
 | 
			
		||||
 | 
			
		||||
- **`compressedPowershell.py`** - Creates a Powershell snippet containing GZIP-Compressed payload that will get decompressed and executed (IEX)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										
											BIN
										
									
								
								windows/GlobalProtectDisable.exe
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										
											BIN
										
									
								
								windows/GlobalProtectDisable.exe
									
									
									
									
									
										Normal file
									
								
							
										
											Binary file not shown.
										
									
								
							
		Reference in New Issue
	
	Block a user