diff --git a/clusters/tool.json b/clusters/tool.json index af6a544..fe882b2 100644 --- a/clusters/tool.json +++ b/clusters/tool.json @@ -8032,7 +8032,68 @@ "related": [], "uuid": "a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051", "value": "Sedkit" + }, + { + "description": "Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.", + "meta": { + "refs": [ + "https://github.com/cobbr/Covenant/" + ], + "synonyms": [], + "type": [ + "post-exploitation framework" + ] + }, + "related": [], + "uuid": "01a4f3c4-a578-49bd-b6ab-eb3b7d27d8c1", + "value": "Covenant" + }, + { + "description": "Cobalt Strike is a post-exploitation framework.", + "meta": { + "refs": [ + "https://www.cobaltstrike.com" + ], + "synonyms": [], + "type": [ + "post-exploitation framework" + ] + }, + "related": [], + "uuid": "97f26fab-af0e-4da9-b4c1-aec70cace22d", + "value": "Cobalt Strike" + }, + { + "description": "Penetration testing framework.", + "meta": { + "refs": [ + "https://www.metasploit.com" + ], + "synonyms": [], + "type": [ + "exploitation framework" + ] + }, + "related": [], + "uuid": "be419332-61ab-45f0-979e-56f78a223c8e", + "value": "metasploit" + }, + { + "description": "A swiss army knife for pentesting networks.", + "meta": { + "refs": [ + "https://github.com/byt3bl33d3r/CrackMapExec", + "https://bitdefender.com/files/News/CaseStudies/study/332/Bitdefender-Whitepaper-Chafer-creat4491-en-EN-interactive.pdf" + ], + "synonyms": [], + "type": [ + "exploitation framework" + ] + }, + "related": [], + "uuid": "e83d1296-027a-4f30-98e0-19622967d5c4", + "value": "CrackMapExec" } ], - "version": 135 + "version": 136 }