if youre CS instances under attack, block public atttackers:
curl -X POST -d "tag=COBALT_STRIKE_SCANNER_HIGH" https://api.greynoise.io/v1/query/tag | python -m json.tool | grep "ip" | cut -d ":" -f 2 | cut -d '"' -f 2 | sort -u | grep -e '^\([0-9]\{1,3\}\.\)\{3\}[0-9]\{1,3\}$' | sed -e 's/^/sudo iptables -I INPUT -s /g' | sed -e 's/$/\/32 -j DROP/g'ProcessTree.cna - cobaltstrike aggressor noscript to build a process tree. Based off @r3dQu1nn's ProcessColor.cna for better session prepping and OpSec. https://github.com/ars3n11/Aggressor-Scripts
GitHub
GitHub - ars3n11/Aggressor-Scripts: Cobalt Strike aggressor noscripts
Cobalt Strike aggressor noscripts. Contribute to ars3n11/Aggressor-Scripts development by creating an account on GitHub.
https://github.com/JPCERTCC/aa-tools/blob/master/cobaltstrikescan.py
Volatility plugin for cobaltstrike beacon forensic
http://www.jpcert.or.jp/magazine/acreport-cobaltstrike.html
Volatility plugin for cobaltstrike beacon forensic
http://www.jpcert.or.jp/magazine/acreport-cobaltstrike.html
GitHub
aa-tools/cobaltstrikescan.py at master · JPCERTCC/aa-tools
Artifact analysis tools by JPCERT/CC Analysis Center - aa-tools/cobaltstrikescan.py at master · JPCERTCC/aa-tools
Little exfil C# tool for compressing, encrypting, and uploading data to Dropbox. Works great using "execute-assembly" in Cobalt Strike.
https://github.com/P1CKLES/SharpBox
https://github.com/P1CKLES/SharpBox
GitHub
GitHub - P1CKLES/SharpBox: SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox…
SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API. - GitHub - P1CKLES/SharpBox: SharpBox is a C# tool for compressing, encrypting, and exfil...
Reference Malleable C2 profile was just updated to take advantage of the latest #CobaltStrike 3.12 additions.
https://github.com/threatexpress/malleable-c2
https://github.com/threatexpress/malleable-c2
GitHub
GitHub - threatexpress/malleable-c2: Cobalt Strike Malleable C2 Design and Reference Guide
Cobalt Strike Malleable C2 Design and Reference Guide - threatexpress/malleable-c2
smbexec_psh.cna
1.4 KB
Had some problems with Cobalt Strike's psexec & mimikatz functions today, so was able to cobble together a solution to achieve psexec from one domain to another with Invoke-SMBExec.ps1
Command and Control via DNS over HTTPS (DoH) for Cobalt Strike
https://github.com/SpiderLabs/DoHC2
https://github.com/SpiderLabs/DoHC2
GitHub
GitHub - SpiderLabs/DoHC2: DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be…
DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2) via DNS over HTTPS (DoH). - SpiderLabs/DoHC2