BeaconGate, Sleepmask... customizing Cobalt Strike after 4.10
https://rwxstoned.github.io/2024-11-13-Cobalt-Strike-customization/
https://rwxstoned.github.io/2024-11-13-Cobalt-Strike-customization/
RWXStoned
BeaconGate, Sleepmask... customizing Cobalt Strike after 4.10 | RWXStoned
a quick new Sleep PoC using the latest Cobalt Strike features
👍3
Process Inject Kit
This is a port of Cobalt Strike's Process Inject Kit from C to the C++ BOF template.
This is a port of Cobalt Strike's Process Inject Kit from C to the C++ BOF template.
GitHub
GitHub - rasta-mouse/process-inject-kit: Port of Cobalt Strike's Process Inject Kit
Port of Cobalt Strike's Process Inject Kit. Contribute to rasta-mouse/process-inject-kit development by creating an account on GitHub.
🥱2❤1👎1💩1
rasta-mouse/process-inject-kit
Port of Cobalt Strike's Process Inject Kit
https://github.com/rasta-mouse/process-inject-kit
Port of Cobalt Strike's Process Inject Kit
https://github.com/rasta-mouse/process-inject-kit
GitHub
GitHub - rasta-mouse/process-inject-kit: Port of Cobalt Strike's Process Inject Kit
Port of Cobalt Strike's Process Inject Kit. Contribute to rasta-mouse/process-inject-kit development by creating an account on GitHub.
🔥3👍1🤡1🥱1😴1
Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection
URL:https://github.com/RedefiningReality/Cobalt-Strike
URL:https://github.com/RedefiningReality/Cobalt-Strike
GitHub
GitHub - RedefiningReality/Cobalt-Strike: Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR…
Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection - RedefiningReality/Cobalt-Strike
👍1
SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature.
https://github.com/med0x2e/SigFlip
https://github.com/med0x2e/SigFlip
GitHub
GitHub - med0x2e/SigFlip: SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating…
SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature. - med0x2e/SigFlip
🤡2
Patchwerk
Cobalt Strike BOF that finds all the Nt*system call stubs within NTDLL and overwrites the memory with clean stubs (user land hook evasion). This way we can use the NTAPIs from our implant code, and if EDR check the call stack it will have originated from NTDLL. It’s pretty much the same as the original unhook by Raph Mudge, but this way there's no need to map ntdll.dll from disk or open handles to remote processes.
Cobalt Strike BOF that finds all the Nt*system call stubs within NTDLL and overwrites the memory with clean stubs (user land hook evasion). This way we can use the NTAPIs from our implant code, and if EDR check the call stack it will have originated from NTDLL. It’s pretty much the same as the original unhook by Raph Mudge, but this way there's no need to map ntdll.dll from disk or open handles to remote processes.
• Uses HellsGate & HalosGate to call direct syscalls for NtOpenProcess, NtWriteVirtualMemory, and NtProtectVirtualMemory.
• Has custom GetModuleHandle & GetProcAddress(getSymbolAddress) written in C and ASM to evade hooks on kernel32.
• If patching table of current process, does not use NtOpenProcess. Just uses hProc = (HANDLE)-1; instead.
❤6💩3🤡2👍1👎1🥱1
StringReaper
CobaltStrike BOF designed to carve strings out of remote process memory. This tool allows operators to carve ASCII and UTF-16 strings from targeted processes, making it effective for retrieving JWT tokens, credentials, and other sensitive data directly from memory. Over the past 3 years i've had great success in using this tool on engagements. Saves time when oping from a C2 where you don't want to have to wait on a full process dump or deal with download size issues.
CobaltStrike BOF designed to carve strings out of remote process memory. This tool allows operators to carve ASCII and UTF-16 strings from targeted processes, making it effective for retrieving JWT tokens, credentials, and other sensitive data directly from memory. Over the past 3 years i've had great success in using this tool on engagements. Saves time when oping from a C2 where you don't want to have to wait on a full process dump or deal with download size issues.
🥱3👍2🤨2😴1
AWS Cobalt Redirector : Streamlining Red Team Operations With Automated C2 Infrastructure
https://kalilinuxtutorials.com/aws-cobalt-redirector/
https://kalilinuxtutorials.com/aws-cobalt-redirector/
Kali Linux Tutorials
AWS Cobalt Redirector : Streamlining Red Team Operations With
The AWS Cobalt Redirector is a tool designed to streamline the deployment of a command-and-control (C2) infrastructure for red team
👍3🔥2
Cobalt Strike 4.11: Shhhhhh, Beacon is Sleeping….
#cobaltstrike
Cobalt Strike 4.11 is now available. This release introduces a novel Sleepmask, a novel process injection technique, new out-of-the-box obfuscation options for Beacon, asynchronous BOFs, and a DNS over HTTPS (DoH) Beacon. Additionally, we have overhauled Beacon’s reflective loader and there are numerous QoL updates. Out-of-the-Box Evasion Overhaul The focus of this release (and the [...]
via Cobalt Strike Blog (author: William Burgess)
#cobaltstrike
Cobalt Strike 4.11 is now available. This release introduces a novel Sleepmask, a novel process injection technique, new out-of-the-box obfuscation options for Beacon, asynchronous BOFs, and a DNS over HTTPS (DoH) Beacon. Additionally, we have overhauled Beacon’s reflective loader and there are numerous QoL updates. Out-of-the-Box Evasion Overhaul The focus of this release (and the [...]
via Cobalt Strike Blog (author: William Burgess)
🔥8👍5❤1
PCAP Threat Hunting with Wireshark -TrickBot & Cobalt Strike Detection | DNS & HTTP
https://github.com/YASHWANTgs/pcap-threat-hunting-trickbot
https://github.com/YASHWANTgs/pcap-threat-hunting-trickbot
GitHub
GitHub - YASHWANTgs/pcap-threat-hunting-trickbot: PCAP Threat Hunting with Wireshark -TrickBot & Cobalt Strike Detection | DNS…
PCAP Threat Hunting with Wireshark -TrickBot & Cobalt Strike Detection | DNS & HTTP - YASHWANTgs/pcap-threat-hunting-trickbot
🔥3
Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops.
https://github.com/armin-hg/NewCobaltstrikeTeamServer
https://github.com/armin-hg/NewCobaltstrikeTeamServer
GitHub
GitHub - armin-hg/NewCobaltstrikeTeamServer: Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and…
Go-based C2 server inspired by Cobalt Strike; seamless agent control, web UI, and Malleable Profile support. Fast, extensible, and secure for red-team ops. 🐙 - armin-hg/NewCobaltstrikeTeamServer
👍2
Implementation of the concept of asynchronous Beacon Object Files. It provides a framework for running asynchronous monitoring tasks that can detect events and report back to the Cobalt Strike team server.
https://github.com/9Insomnie/async_bof
https://github.com/9Insomnie/async_bof
GitHub
GitHub - 9Insomnie/async_bof: 异步Beacon Object Files概念的实现。它提供了一个框架,用于运行可以检测事件并报告回Cobalt Strike团队服务器的异步监控任务。
异步Beacon Object Files概念的实现。它提供了一个框架,用于运行可以检测事件并报告回Cobalt Strike团队服务器的异步监控任务。 - 9Insomnie/async_bof
❤2
Robust Cobalt Strike shellcode loader with multiple advanced evasion features
https://github.com/Meowmycks/koneko
https://github.com/Meowmycks/koneko
GitHub
GitHub - Meowmycks/koneko: Robust Cobalt Strike shellcode loader with multiple advanced evasion features
Robust Cobalt Strike shellcode loader with multiple advanced evasion features - Meowmycks/koneko
❤6
Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover
After Microsoft patched Yuval Gordon’s BadSuccessor privilege escalation technique, BadSuccessor returned with another blog from Yuval, briefly mentioning to the community that attackers can still abuse dMSAs to take over any object where we have a write primitive. This mention did not gather significant attention from the community, leaving an operational gap for dMSA related tooling and attention. This blog dives into why dMSA abuse is still a problem, the release of a new Beacon object file (BOF) labeled BadTakeover, plus additions to SharpSuccessor, all to show that BadSuccessor’s impact as a technique (not a vulnerability) will still hold a lasting effect.
https://github.com/logangoins/BadTakeover-BOF
https://specterops.io/blog/2025/10/20/the-near-return-of-the-king-account-takeover-using-the-badsuccessor-technique/
After Microsoft patched Yuval Gordon’s BadSuccessor privilege escalation technique, BadSuccessor returned with another blog from Yuval, briefly mentioning to the community that attackers can still abuse dMSAs to take over any object where we have a write primitive. This mention did not gather significant attention from the community, leaving an operational gap for dMSA related tooling and attention. This blog dives into why dMSA abuse is still a problem, the release of a new Beacon object file (BOF) labeled BadTakeover, plus additions to SharpSuccessor, all to show that BadSuccessor’s impact as a technique (not a vulnerability) will still hold a lasting effect.
https://github.com/logangoins/BadTakeover-BOF
https://specterops.io/blog/2025/10/20/the-near-return-of-the-king-account-takeover-using-the-badsuccessor-technique/
GitHub
GitHub - logangoins/BadTakeover-BOF: Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover
Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover - logangoins/BadTakeover-BOF
❤5
Cobalt Strike Beacon Object File to enumerate Windows system drivers via WMI
https://github.com/0x73/CS-DriverQuery-BOF
https://github.com/0x73/CS-DriverQuery-BOF
GitHub
GitHub - 0x73/CS-DriverQuery-BOF: Cobalt Strike Beacon Object File to enumerate Windows system drivers via WMI
Cobalt Strike Beacon Object File to enumerate Windows system drivers via WMI - 0x73/CS-DriverQuery-BOF
🔥3
CobaltStrike’s AI-native successor, ‘Villager,’ makes hacking too easy
https://www.csoonline.com/article/4057785/cobaltstrikes-ai-native-successor-villager-makes-hacking-too-easy.html
https://www.straiker.ai/blog/cyberspike-villager-cobalt-strike-ai-native-successor
https://www.csoonline.com/article/4057785/cobaltstrikes-ai-native-successor-villager-makes-hacking-too-easy.html
https://www.straiker.ai/blog/cyberspike-villager-cobalt-strike-ai-native-successor
CSO Online
CobaltStrike’s AI-native successor, ‘Villager,’ makes hacking too easy
The new AI-native framework, freely available online, could make advanced cyberattacks faster, easier, and more accessible than ever.
Cobalt Strike aggressor noscript to add context-menu option for clearing beacon queue
https://github.com/PN-Tester/AbortCommand
https://github.com/PN-Tester/AbortCommand
GitHub
GitHub - PN-Tester/AbortCommand: CobaltStrike aggressor noscript to add context-menu option for clearing beacon queues
CobaltStrike aggressor noscript to add context-menu option for clearing beacon queues - PN-Tester/AbortCommand
❤2
Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles for stealthy operations and efficient output handling.
https://github.com/evelyn67a/BOF_RunPe
https://github.com/evelyn67a/BOF_RunPe
GitHub
GitHub - evelyn67a/BOF_RunPe: 🛠️ Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles…
🛠️ Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles for stealthy operations and efficient output handling. - evelyn67a/BOF_RunPe
❤8