mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-29 18:27:19 +00:00
Add CrackMapExec, metasploit, Cobalt Strike and Covenant
This commit is contained in:
parent
313003ed65
commit
143bd521be
1 changed files with 62 additions and 1 deletions
|
@ -8032,7 +8032,68 @@
|
||||||
"related": [],
|
"related": [],
|
||||||
"uuid": "a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051",
|
"uuid": "a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051",
|
||||||
"value": "Sedkit"
|
"value": "Sedkit"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://github.com/cobbr/Covenant/"
|
||||||
|
],
|
||||||
|
"synonyms": [],
|
||||||
|
"type": [
|
||||||
|
"post-exploitation framework"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"related": [],
|
||||||
|
"uuid": "01a4f3c4-a578-49bd-b6ab-eb3b7d27d8c1",
|
||||||
|
"value": "Covenant"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Cobalt Strike is a post-exploitation framework.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.cobaltstrike.com"
|
||||||
|
],
|
||||||
|
"synonyms": [],
|
||||||
|
"type": [
|
||||||
|
"post-exploitation framework"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"related": [],
|
||||||
|
"uuid": "97f26fab-af0e-4da9-b4c1-aec70cace22d",
|
||||||
|
"value": "Cobalt Strike"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Penetration testing framework.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.metasploit.com"
|
||||||
|
],
|
||||||
|
"synonyms": [],
|
||||||
|
"type": [
|
||||||
|
"exploitation framework"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"related": [],
|
||||||
|
"uuid": "be419332-61ab-45f0-979e-56f78a223c8e",
|
||||||
|
"value": "metasploit"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "A swiss army knife for pentesting networks.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://github.com/byt3bl33d3r/CrackMapExec",
|
||||||
|
"https://bitdefender.com/files/News/CaseStudies/study/332/Bitdefender-Whitepaper-Chafer-creat4491-en-EN-interactive.pdf"
|
||||||
|
],
|
||||||
|
"synonyms": [],
|
||||||
|
"type": [
|
||||||
|
"exploitation framework"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"related": [],
|
||||||
|
"uuid": "e83d1296-027a-4f30-98e0-19622967d5c4",
|
||||||
|
"value": "CrackMapExec"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 135
|
"version": 136
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue