Category: Cobalt Strike

RedShell – An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server

RedShell – An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server

An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server.Installatio [...]
The alleged decompiled source code of Cobalt Strike toolkit leaked online

The alleged decompiled source code of Cobalt Strike toolkit leaked online

The alleged decompiled source code for the Cobalt Strike post-exploitation toolkit has been leaked online in a GitHub repository. The decompiled sourc [...]
CobaltStrikeScan – Scan Files Or Process Memory For CobaltStrike Beacons And Parse Their Configuration

CobaltStrikeScan – Scan Files Or Process Memory For CobaltStrike Beacons And Parse Their Configuration

Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence [...]
CrossC2 – Generate CobaltStrike’s Cross-Platform Payload

CrossC2 – Generate CobaltStrike’s Cross-Platform Payload

A security framework for enterprises and Red Team personnel, supports CobaltStrike's penetration testing of other platforms (Linux / MacOS / [...]
SharpHose – Asynchronous Password Spraying Tool In C# For Windows Environments

SharpHose – Asynchronous Password Spraying Tool In C# For Windows Environments

SharpHose is a C# password spraying tool designed to be fast, safe, and usable over Cobalt Strike's execute-assembly. It provides a flexible w [...]
Taowu – A CobaltStrike Toolkit

Taowu – A CobaltStrike Toolkit

TaoWu(檮杌) is a CobaltStrike toolkit. All the scripts are gathered on the Internet and slightly modified by myself. You can use it under GPLv3. And [...]
Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature

Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature

This blog post was authored by Hossein Jazi and Jérôme Segura On June 10, we found a malicious Word document disguised as a resume that uses template [...]
Axiom – A Dynamic Infrastructure Toolkit For Red Teamers And Bug Bounty Hunters!

Axiom – A Dynamic Infrastructure Toolkit For Red Teamers And Bug Bounty Hunters!

Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty and pentesting.Axiom right now is perfect for [...]
Ps-Tools – An Advanced Process Monitoring Toolkit For Offensive Operations

Ps-Tools – An Advanced Process Monitoring Toolkit For Offensive Operations

Having a good technical understanding of the systems we land on during an engagement is a key condition for deciding what is going to be the next ste [...]
Ninja – Open Source C2 Server Created For Stealth Red Team Operations

Ninja – Open Source C2 Server Created For Stealth Red Team Operations

Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directoty enumeration without being detected by SIEM a [...]
10 / 10 POSTS
Close Bitnami banner
Bitnami