C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
-
Updated
Mar 15, 2024 - Python
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
Emulate and Dissect MSF and *other* attacks
Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles
A pure python, Cobalt Strike External C2 client library
Scripts, YARA and IOCs from our research on the Blister malware 🩹
Detecting Cobalt Strike Team Servers on targets through traffic telemetry.
Setup server-less Cobolt strike redirector with one click
Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...
Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles
CobaltStike 挂载脚本将上线主机信息通过 Server 酱通知到微信
This code will pull Cobalt Strike Team Servers and Metasploit Servers from Shodan's API using various criteria.
Parses logs created by Cobalt Strike and creates an SQLite DB which can be used to create custom reports.
An offensive security framework for writing payloads
Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.
beacon notifier to jabber
FROM:@Mr-xn 渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Probably the easiest way to setup new beacon notifications in Cobalt Strike
Add a description, image, and links to the cobaltstrike topic page so that developers can more easily learn about it.
To associate your repository with the cobaltstrike topic, visit your repo's landing page and select "manage topics."