{"id":13389258,"url":"https://github.com/harleyQu1nn/AggressorScripts","last_synced_at":"2025-03-13T14:31:18.041Z","repository":{"id":41045092,"uuid":"88980375","full_name":"harleyQu1nn/AggressorScripts","owner":"harleyQu1nn","description":"Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources","archived":false,"fork":false,"pushed_at":"2023-06-30T15:26:52.000Z","size":194,"stargazers_count":1494,"open_issues_count":2,"forks_count":300,"subscribers_count":65,"default_branch":"master","last_synced_at":"2025-03-11T00:48:31.658Z","etag":null,"topics":["aggressor","aggressor-scripts","cna","cobalt-strike","red-team","scripts"],"latest_commit_sha":null,"homepage":null,"language":"C#","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/harleyQu1nn.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2017-04-21T12:14:35.000Z","updated_at":"2025-03-10T18:01:14.000Z","dependencies_parsed_at":"2022-08-10T01:18:34.830Z","dependency_job_id":"dcb11175-5126-4f78-9ac9-6472158a3ac2","html_url":"https://github.com/harleyQu1nn/AggressorScripts","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/harleyQu1nn%2FAggressorScripts","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/harleyQu1nn%2FAggressorScripts/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/harleyQu1nn%2FAggressorScripts/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/harleyQu1nn%2FAggressorScripts/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/harleyQu1nn","download_url":"https://codeload.github.com/harleyQu1nn/AggressorScripts/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":243422429,"owners_count":20288456,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["aggressor","aggressor-scripts","cna","cobalt-strike","red-team","scripts"],"created_at":"2024-07-30T13:01:03.864Z","updated_at":"2025-03-13T14:31:18.007Z","avatar_url":"https://github.com/harleyQu1nn.png","language":"C#","readme":"# Aggressor Scripts\nCollection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources\n* All_In_One.cna v1 - Removed and outdated\n    \n   * All purpose script to enhance the user's experience with cobaltstrike. Custom menu creation, Logging, Persistence,        Enumeration, and 3rd party script integration.\n    * Version 2 is currently in development!\n\n* ArtifactPayloadGenerator.cna\n\n    * Generates every type of Stageless/Staged Payload based off a HTTP/HTTPS Listener\n    \n    * Creates /opt/cobaltstrike/Staged_Payloads, /opt/cobaltstrike/Stageless_Payloads\n    \n* AVQuery.cna\n\n    * Queries the Registry with powershell for all AV Installed on the target\n    \n    * Quick and easy way to get the AV you are dealing with as an attacker\n    \n    ![av](https://user-images.githubusercontent.com/27856212/28275624-7331ab2e-6ae2-11e7-8405-3393e917863e.png)\n\n* CertUtilWebDelivery.cna\n\n    * Stageless Web Delivery using CertUtil.exe \n    \n    * Powerpick is used to spawn certutil.exe to download the stageless payload on target and execute with rundll32.exe\n    \n    ![certutil2](https://user-images.githubusercontent.com/27856212/29992549-12d45854-8f6c-11e7-95c7-c2892582f56f.PNG)\n    \n* EDR.cna\n    \n    * Detects EDR solutions running on local/remote hosts\n    \n* RedTeamRepo.cna\n\n    * A common collection of OS commands, and Red Team Tips for when you have no Google or RTFM on hand.\n    \n    * Script will be updated on occasion, feedback and more inputs are welcomed!\n    \n    ![redrepo](https://user-images.githubusercontent.com/27856212/30020754-00fedd70-9133-11e7-80d4-dff3be7ab876.PNG)\n    \n* ProcessColor.cna\n\n    * Color coded process listing without the file requirement.\n    \n    * Thanks to @oldb00t for the original version: https://github.com/oldb00t/AggressorScripts/tree/master/Ps-highlight\n    \n    ![process](https://user-images.githubusercontent.com/27856212/33582815-575d368e-d914-11e7-8d48-fd4c915af5d6.png)\n    \n","funding_links":[],"categories":["C# #","C# (212)"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FharleyQu1nn%2FAggressorScripts","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FharleyQu1nn%2FAggressorScripts","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FharleyQu1nn%2FAggressorScripts/lists"}