cobaltstrike @c0baltstrike Channel on Telegram

cobaltstrike

@c0baltstrike


All about Cobalt Strike. New versions, articles and more.

cobaltstrike (English)

Are you interested in learning more about Cobalt Strike? Look no further than the 'c0baltstrike' Telegram channel! Here you will find all the latest updates on new versions, insightful articles, and much more related to Cobalt Strike. nnCobalt Strike is a powerful penetration testing tool that is widely used by cybersecurity professionals to simulate cyber attacks and test the security of systems. It provides advanced features for red team operations, including post-exploitation, lateral movement, and data exfiltration. With its user-friendly interface and comprehensive set of tools, Cobalt Strike has become a go-to tool for professionals in the field.nnThe 'c0baltstrike' Telegram channel is a one-stop destination for all things related to Cobalt Strike. Whether you are a beginner looking to learn more about the tool or an experienced user wanting to stay updated on the latest developments, this channel has something for everyone. From tutorials on how to effectively use Cobalt Strike to discussions on security best practices, the channel covers a wide range of topics to cater to the needs of its diverse audience.nnJoining the 'c0baltstrike' Telegram channel is a great way to connect with like-minded individuals who share a passion for cybersecurity and penetration testing. You can engage in discussions, ask questions, and stay informed about the latest trends in the industry. The channel also serves as a valuable resource for professionals looking to enhance their skills and stay ahead of the curve in the rapidly evolving field of cybersecurity.nnDon't miss out on the opportunity to be part of this knowledgeable community dedicated to all things Cobalt Strike. Join the 'c0baltstrike' Telegram channel today and take your cybersecurity knowledge to the next level!

cobaltstrike

15 Nov, 08:06


BeaconGate, Sleepmask... customizing Cobalt Strike after 4.10

https://rwxstoned.github.io/2024-11-13-Cobalt-Strike-customization/

cobaltstrike

08 Sep, 16:45


https://github.com/b3nguang/CS-Dingtalk-Bot

cobaltstrike

01 Sep, 06:19


NtDumpBOF

BOF port of the tool NativeDump which dump lsass using only Native APIs

cobaltstrike

15 Aug, 12:49


DojoLoader — Generic PE Loader for Prototyping Evasion Techniques

This is a versatile PE loader designed for prototyping evasion techniques. It supports downloading and executing encrypted shellcode, dynamic IAT hooking, and three Sleep obfuscation methods. Ideal for use with UDRL-less Beacon payloads from Cobalt Strike.

Blog Post:
https://www.naksyn.com/cobalt%20strike/2024/07/02/raising-beacons-without-UDRLs-teaching-how-to-sleep.html

Source:
https://github.com/naksyn/DojoLoader

#cobaltstrike #udrl #memory #evasion

cobaltstrike

26 Jul, 14:31


Injecting Malicious Code into PDF Files and PDF Dropper Creation

https://cti.monster/blog/2024/07/25/pdfdropper.html

cobaltstrike

31 Mar, 09:17


https://github.com/Tw1sm/SQL-BOF

cobaltstrike

19 Mar, 06:49


https://github.com/Crypt0s/DelegationBOF

cobaltstrike

26 Jan, 11:07


Creating Object File Monstrosities with Sleep Mask and LLVM

The Mutator kit is now part of the Cobalt Strike Arsenal Kit. It allows you to mutate BOFs, sleep masks and more with LLVM.

🔗 https://www.cobaltstrike.com/blog/introducing-the-mutator-kit-creating-object-file-monstrosities-with-sleep-mask-and-llvm

cobaltstrike

15 Jan, 12:21


NIM loader Cobalt Strike

https://github.com/yutianqaq/CSx3Ldr

cobaltstrike

28 Nov, 07:45


Create Reflective DLL for Cobalt Strike with GOLANG

https://sokarepo.github.io//redteam/2023/10/11/create-reflective-dll-for-cobaltstrike.html

cobaltstrike

19 Oct, 11:22


Stealth redirector for your red team operation security

https://github.com/D00Movenok/BounceBack

cobaltstrike

10 Oct, 14:24


BOFRYPTOR: ENCRYPTING YOUR BEACON DURING BOF EXECUTION TO AVOID MEMORY SCANNERS

https://github.com/securifybv/BOFRyptor

cobaltstrike

04 Oct, 14:36


Taking a quick look at the new Aggressor callbacks in Cobalt Strike 4.9.

https://rastamouse.me/cobalt-strike-aggressor-callbacks/

cobaltstrike

26 Sep, 05:48


BooM 💥

cobaltstrike

26 Sep, 05:47


Cobalt Strike 4.9: Take Me To Your Loader

https://www.cobaltstrike.com/blog/cobalt-strike-49-take-me-to-your-loader

cobaltstrike

12 Sep, 06:39


Red Team C2 Log Visualization (include Cobalt Strike)

https://github.com/cisagov/RedEye

cobaltstrike

25 Aug, 04:58


https://github.com/Octoberfest7/CVE-2023-36874_BOF

Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE

cobaltstrike

20 Jul, 06:54


Run BOFs written for Cobalt Strike in Brute Ratel C4

https://blog.nviso.eu/2023/07/17/introducing-cs2br-pt-ii-one-tool-to-port-them-all/

https://github.com/NVISOsecurity/cs2br-bof

cobaltstrike

19 Jul, 19:13


MSI BOF LPE

https://www.mandiant.com/resources/blog/privileges-third-party-windows-installers


https://github.com/mandiant/msi-search