A detailed account of participating in the Red Team for Pacific Rim CCDC 2017, focusing on Windows Meta Team infrastructure design, Cobalt Strike Aggressor scripts, and providing tips for the competition.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.
Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
Emulates Docker HTTP API with event logging and AWS deployment script.
A penetration testing framework for identifying and exploiting vulnerabilities.
A cheat sheet providing examples of creating reverse shells for penetration testing.