Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
CSSG
Cobalt Strike Shellcode Generator
Ryan Stephenson (RCStep)
Adds Shellcode - Shellcode Generator to the Cobalt Strike top menu bar
CSSG is aggressor, .NET, and python scripts used to more easily generate and format beacon shellcode
Generates beacon stageless shellcode with exposed exit...
Top 10 Tools Most Used by Cybercriminals in 2024
Introduction
As cybersecurity threats evolve, so do the tools and techniques used by cybercriminals. In 2024, many of these tools are designed to evade detection, automate attacks, and exploit vulnerabilities at scale. By understanding these...
Red Team Operations: Techniques, Tools, and Everything You Need to Know
Introduction
Red Team operations play a crucial role in evaluating and enhancing an organization’s cybersecurity posture. Unlike traditional security assessments, Red Teaming focuses on emulating real-world attack...
RedGuard - C2 Front Flow Control Tool, Can Avoid Blue Teams, AVs, EDRs Check
RedGuard, a derivative tool based on command and control (C2) front flow control technology, has a lighter design, efficient traffic interaction, and reliable compatibility with development in the go programming...
geacon_pro is an Anti-Virus bypassing CobaltStrike Beacon written in Golang based on the geacon project.
geacon_pro supports CobaltStrike version 4.1+
geacon_pro has implemented most functions of Beacon.
The core of bypassing Anti-Virus can be reflected in three aspects:
There is no...
Adversary Simulations and Red Team Operations are security assessments that replicate the tactics and techniques of an advanced adversary in a network. While penetration tests focus on unpatched vulnerabilities and misconfigurations, these assessments benefit security operations and incident...
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
Hidden content
1 ) DCOM Lateral Movement
A quick PoC that uses DCOM (ShellWindows) via beacon object files for lateral movement. You can either specify credentials or use the current user. To use the current user, just leave the domain, username, and password empty. A short article can be about using COM...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.