Category: Post Exploitation

Cobalt Strike Aggressor Script

Registry-Recon: Performs System/AV/EDR Recon

Registry-Recon Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon Description As a red-team practitioner, we are often using tools that attempt to fingerprint details about a compromised system, preferably in the most stealthy way...

remotely extract credentials

lsassy v3.0 releases: Extract credentials from lsass remotely

lsassy Python library to remotely extract credentials. This library uses impacket projects to remotely read necessary bytes in lsass dump and pypykatz to extract credentials. Changelog v3.0 Complete rewrite of the tool Way more modular Easy way to...

CrackMapExec

CrackMapExecWin: CrackMapExec compiled for Windows

CrackMapExecWin CrackMapExec v5.1.0 compiled for Windows Features Latest v5.1 version Compiled for windows x64 platforms Usage Download Crackmapexec from Release section Download and Install the VC_redist.x64.exe ‘Microsoft Visual C++ 2017 Redistributable (x64)‘ Download and...

SharpHound

SharpHound: C# Rewrite of the BloodHound Ingestor

SharpHound – C# Rewrite of the BloodHound Ingestor Usage Enumeration Options CollectionMethod – The collection method to use. This parameter accepts a comma-separated list of values. Has the following potential values (Default: Default): Default –...