C# OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.
OffensivePipeline
OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.
OffensivePipeline downloads the tool from the git repository, then compiles it with msbuild and finally obfuscates it with ConfuserEx.
Examples
List all tools:
OffensivePipeline.exe list
Build all tools:
OffensivePipeline.exe all
Build a tool
OffensivePipeline.exe t toolName
Add new tools
The scripts for downloading the tools are in the Tools folder in yml format. New tools can be added by creating new yml files with the following format:
Rubeus.yml file:
tool:
- name: Rubeusdescription: Rubeus is a C# toolset for raw Kerberos interaction and abusesgitLink: https://github.com/GhostPack/RubeussolutionPath: Rubeus\Rubeus.sln
Requirements for the release version (Visual Studio 2019 is not required)
Description: Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
Description: SharpChromium is a .NET 4.0+ CLR project to retrieve data from Google Chrome, Microsoft Edge, and Microsoft Edge Beta. Currently, it can extract
Description: SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by that GPO.
Description: SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt Strike.
Some tools have problems when they are obfuscated (ConfuserEx does not find the dependencies). In a future release of OffensivePipeline this will be patched.