• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

cobaltstrike

  1. dEEpEst

    Hacking Cobalt Strike Shellcode Generator

    CSSG Cobalt Strike Shellcode Generator Ryan Stephenson (RCStep) Adds Shellcode - Shellcode Generator to the Cobalt Strike top menu bar CSSG is aggressor, .NET, and python scripts used to more easily generate and format beacon shellcode Generates beacon stageless shellcode with exposed exit...
  2. dEEpEst

    Top 10 Tools Most Used by Cybercriminals

    Top 10 Tools Most Used by Cybercriminals in 2024 Introduction As cybersecurity threats evolve, so do the tools and techniques used by cybercriminals. In 2024, many of these tools are designed to evade detection, automate attacks, and exploit vulnerabilities at scale. By understanding these...
  3. dEEpEst

    Red Team Operations

    Red Team Operations: Techniques, Tools, and Everything You Need to Know Introduction Red Team operations play a crucial role in evaluating and enhancing an organization’s cybersecurity posture. Unlike traditional security assessments, Red Teaming focuses on emulating real-world attack...
  4. 0x1

    Pentest RedGuard C2 Front Flow Control tool

    RedGuard - C2 Front Flow Control Tool, Can Avoid Blue Teams, AVs, EDRs Check RedGuard, a derivative tool based on command and control (C2) front flow control technology, has a lighter design, efficient traffic interaction, and reliable compatibility with development in the go programming...
  5. Y

    cobaltstrike

    who has c2lint for 4.7
  6. itsMe

    Geacon_pro: cross-platform CobaltStrike Beacon bypass anti-virus

    geacon_pro is an Anti-Virus bypassing CobaltStrike Beacon written in Golang based on the geacon project. geacon_pro supports CobaltStrike version 4.1+ geacon_pro has implemented most functions of Beacon. The core of bypassing Anti-Virus can be reflected in three aspects:     There is no...
  7. itsMe

    CobaltStrike 4.7 (included Dark Mod is Full)

    Adversary Simulations and Red Team Operations are security assessments that replicate the tactics and techniques of an advanced adversary in a network. While penetration tests focus on unpatched vulnerabilities and misconfigurations, these assessments benefit security operations and incident...
  8. itsMe

    RedWarden - Flexible CobaltStrike Malleable Redirector

    Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation Hidden content
  9. itsMe

    CobaltStrike BOF: Collection of beacon BOF

    1 ) DCOM Lateral Movement A quick PoC that uses DCOM (ShellWindows) via beacon object files for lateral movement. You can either specify credentials or use the current user. To use the current user, just leave the domain, username, and password empty. A short article can be about using COM...
Back
Top