Add CrackMapExec, metasploit, Cobalt Strike and Covenant

pull/551/head
Thomas Dupuy 2020-05-26 09:35:01 -04:00
parent 313003ed65
commit 143bd521be
1 changed files with 62 additions and 1 deletions

View File

@ -8032,7 +8032,68 @@
"related": [],
"uuid": "a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051",
"value": "Sedkit"
},
{
"description": "Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.",
"meta": {
"refs": [
"https://github.com/cobbr/Covenant/"
],
"synonyms": [],
"type": [
"post-exploitation framework"
]
},
"related": [],
"uuid": "01a4f3c4-a578-49bd-b6ab-eb3b7d27d8c1",
"value": "Covenant"
},
{
"description": "Cobalt Strike is a post-exploitation framework.",
"meta": {
"refs": [
"https://www.cobaltstrike.com"
],
"synonyms": [],
"type": [
"post-exploitation framework"
]
},
"related": [],
"uuid": "97f26fab-af0e-4da9-b4c1-aec70cace22d",
"value": "Cobalt Strike"
},
{
"description": "Penetration testing framework.",
"meta": {
"refs": [
"https://www.metasploit.com"
],
"synonyms": [],
"type": [
"exploitation framework"
]
},
"related": [],
"uuid": "be419332-61ab-45f0-979e-56f78a223c8e",
"value": "metasploit"
},
{
"description": "A swiss army knife for pentesting networks.",
"meta": {
"refs": [
"https://github.com/byt3bl33d3r/CrackMapExec",
"https://bitdefender.com/files/News/CaseStudies/study/332/Bitdefender-Whitepaper-Chafer-creat4491-en-EN-interactive.pdf"
],
"synonyms": [],
"type": [
"exploitation framework"
]
},
"related": [],
"uuid": "e83d1296-027a-4f30-98e0-19622967d5c4",
"value": "CrackMapExec"
}
],
"version": 135
"version": 136
}