https://github.com/threatexpress/aggressor-scripts
Cobalt Strike Aggressor Scripts
https://github.com/threatexpress/aggressor-scripts
Last synced: 11 days ago
JSON representation
Cobalt Strike Aggressor Scripts
- Host: GitHub
- URL: https://github.com/threatexpress/aggressor-scripts
- Owner: threatexpress
- License: mit
- Created: 2018-07-31T18:21:05.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2024-11-19T19:49:12.000Z (5 months ago)
- Last Synced: 2025-03-29T04:05:09.791Z (18 days ago)
- Language: JavaScript
- Size: 15.3 MB
- Stars: 141
- Watchers: 5
- Forks: 19
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-security-collection - **36**星
- awesome-hacking-lists - threatexpress/aggressor-scripts - Cobalt Strike Aggressor Scripts (JavaScript)
README
# Cobalt Strike Aggressor Scripts
Collection of Cobalt Strike Aggressor Scripts
## enumerate.cna
Cobalt Strike Aggressor script function and alias to perform some rudimentary Windows host enumeration with Beacon built-in API-only commands.
Additionally, adds a basic `enumerate` alias for Linux based systems in SSH sessions.
## wmi_msbuild
Extends Beacon's `jump` command by adding a `wmi_msbuild` option that uses remote WMI to create a new msbuild process and execute an XML file generated via python with encrypted Beacon stageless shellcode. See wmi_msbuild.cna for OPSEC notes and usage.
Adapted by @andrewchiles for CS 4.0+ jump and removed PowerLessShell requirement
Original Authors: Alyssa (ramen0x3f), MrT__F version for PowerLessShell