BloodHound, Downloads, Hacking Tools, Man In The Middle, mimikatz, NTLM Hashes, PowerShell, PowerUp, Privilege Escalation, Red Team, Windows

OffensivePipeline – Tool To Download, Compile (Without Visual Studio) And Obfuscate C# Tools For Red Team Exercises

OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.

OffensivePipeline downloads the tool from the git repository, then compiles it with msbuild and finally obfuscates it with ConfuserEx.

Examples

  • List all tools:
OffensivePipeline.exe list
  • Build all tools:
OffensivePipeline.exe all
  • Build a tool
OffensivePipeline.exe t toolName

Add new tools

The scripts for downloading the tools are in the Tools folder in yml format. New tools can be added by creating new yml files with the following format:

  • Rubeus.yml file:
tool:
- name: Rubeus
description: Rubeus is a C# toolset for raw Kerberos interaction and abuses
gitLink: https://github.com/GhostPack/Rubeus
solutionPath: Rubeus\Rubeus.sln

Requirements for the release version (Visual Studio 2019 is not required)

  • Disable the antivirus 😀
  • Teste on Windows 10 Pro – Version 20H2 – Build 19042.631

Requirements for build

Supported tools

  • Internal-Monologue:
  • InveighZero:
  • Rubeus:
  • Seatbelt:
    • Description: Seatbelt is a C# project that performs a number of security oriented host-survey “safety checks” relevant from both offensive and defensive security perspectives.
    • GitLink: https://github.com/GhostPack/Seatbelt
  • SharpChromium:
  • SharpDPAPI:
  • SharpGPOAbuse:
    • Description: SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user’s edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by that GPO.
    • GitLink: https://github.com/FSecureLABS/SharpGPOAbuse
  • SharpHound3:
  • SharpMove:
  • SharpRDP:
  • Sharp-SMBExec:
  • SharpSpray:
    • Description: SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt Strike.
    • GitLink: https://github.com/jnqpblc/SharpSpray
  • SharpStay:
  • SharpUp:
  • SharpView:
  • SharpWMI:
  • ThreatCheck:
  • Watson:
  • winPEAS:

Source : KitPloit – PenTest Tools!

Previous ArticleNext Article
Send this to a friend