Hacknetics
search
⌘Ctrlk
Hacknetics
  • Hacknetics
  • Active Directory Management
  • Active Directory AD Attacks
  • buffer-overflows
  • c2-frameworks
    • Sliver
    • Powershell Empire
    • Metasploit
    • Pwncat-cs
    • Cobalt Strike
      • AppLocker Bypasses
      • BOFHound
      • Credentials
      • DCSync and Ticket Forgery
      • Enumeration
      • Forest and Trust Attacks
      • Impersonation
      • Kerberos Delegation
      • Lateral Movement
      • MSSQL Attacks
      • Persistence with CS
      • Privilege Escalation
      • PowerShell Shellcode Loader
    • Dcrat
    • FFM Documentation
  • covering-tracks
  • Data Exfiltration
  • Exploit Development
  • file-transfers
  • lateral-movement
  • lin-priv-esc
  • Things I have Pwn'd before
  • persistence
  • recon-enumeration
  • resources
  • shells
  • tool-guides
  • Web Path
  • Wifi/Bluetooth/ZigBee/SDR/SmartCards
  • Windows
  • firewalls
  • Malware Analysis
  • Infrastructure Development
  • EDR
  • Host Forensics
  • Cloud
  • OSINT
  • Phishing
  • Random
  • Linux
  • Windows Malware Development
  • Golang
  • Mikrotik
  • Firmware Reversing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. c2-frameworks

Cobalt Strike

AppLocker Bypasseschevron-rightBOFHoundchevron-rightCredentialschevron-rightDCSync and Ticket Forgerychevron-rightEnumerationchevron-rightForest and Trust Attackschevron-rightImpersonationchevron-rightKerberos Delegationchevron-rightLateral Movementchevron-rightMSSQL Attackschevron-rightPersistence with CSchevron-rightPrivilege Escalationchevron-rightPowerShell Shellcode Loaderchevron-right
PreviousPwncat-cschevron-leftNextAppLocker Bypasseschevron-right

Last updated 2 months ago