Red Teaming and Malware Analysis
More
Search
Ctrl + K
Extras + Plugins
Previous
Pivoting DMZ: weevely + ngrok + CS Pivot COMBO via Linux
Next
Resources
Last updated
3 years ago
C2 Malleable Profiles
Aggressor Scripts
GitHub - threatexpress/random_c2_profile: Cobalt Strike random C2 Profile generator
GitHub
GitHub - xx0hcd/Malleable-C2-Profiles: Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.com/.
GitHub
GitHub - Porchetta-Industries/pyMalleableC2: Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.
GitHub
GitHub - Cobalt-Strike/sleep_python_bridge: This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client. NOTE: This project is very much in BETA. The goal is to provide a playground for testing and is in no way an officially support feature. Perhaps this could be something added in the future to the core product.
GitHub
https://github.com/pandasec888/taowu-cobalt-strike/tree/english
github.com
GitHub - 0xthirteen/MoveKit: Cobalt Strike kit for Lateral Movement
GitHub
GitHub - bitsadmin/fakelogonscreen: Fake Windows logon screen to steal passwords
GitHub
GitHub - sec-consult/aggrokatz: Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it to parse LSASS dump files and registry hive files to extract credentials and other secrets stored without downloading the file and without uploading any suspicious code to the beacon.
GitHub
GitHub - harleyQu1nn/AggressorScripts: Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
GitHub
GitHub - zer0yu/Awesome-CobaltStrike: cobaltstrike的相关资源汇总 / List of Awesome CobaltStrike Resources
GitHub