Пожалуйста, обратите внимание, что пользователь заблокирован
cobaltstrike的相关资源汇总 / List of Awesome CobaltStrike Resources
[ https://github.com/zer0yu/Awesome-CobaltStrike ]
[ https://github.com/zer0yu/Awesome-CobaltStrike ]
Contents
- 0x00 Introduction
- 0x01 Articles & Videos
- 0x02 C2 Profiles
- 0x03 BOF
- 0x04 Aggressor Script
- 0x05 Related Tools
- 0x06 Related Resources
0x00 Introduction
- The first part is a collection of quality articles about CobaltStrike
- The third part is about the integration of the new features BOF resources
- This project is to solve the problem of not finding the right aggressor script or BOF when it is needed
- If there is quality content that is not covered in this repo, welcome to submit pr
0x01 Articles & Videos
1. Basic Knowledge
- Cobalt_Strike_wiki
- Cobalt Strike Book
- CobaltStrike4.0笔记
- CobaltStrike相关网络文章集合
- Cobalt Strike 外部 C2 之原理篇
- Cobalt Strike 桌面控制问题的解决(以及屏幕截图等后渗透工具)
- Cobalt Strike & MetaSploit 联动
- Cobalt-Strike-CheatSheet
- Cobalt Strike MITRE TTPs
- Red Team Operations with Cobalt Strike (2019)
2. Crack and Customisation
- IntelliJ-IDEA修改cobaltstrike
- CobaltStrike二次开发环境准备
- Cobal Strike 自定义OneLiner
- 通过反射DLL注入来构建后渗透模块(第一课)
- Cobalt Strike Aggressor Script (第一课)
- Cobalt Strike Aggressor Script (第二课)
- Implementing Syscalls In The Cobaltstrike Artifact Kit
- Cobalt Strike 4.0 认证及修补过程
- 使用ReflectiveDLLInjection武装你的CobaltStrike
- Bypass cobaltstrike beacon config scan
- Tailoring Cobalt Strike on Target
- COFFLOADER: BUILDING YOUR OWN IN MEMORY LOADER OR HOW TO RUN BOFS
- Yet Another Cobalt Strike Stager: GUID Edition
- Cobalt Strike4.3 破解日记
- Cobalt Strike 进程创建与对应的 Syslog 日志分析
3. Useful Trick
- Cobalt Strike Spear Phish
- run CS in win -- teamserver.bat
- Remote NTLM relaying through CS -- related to CVE_2018_8581
- Cobalt Strike Convet VPN
- 渗透神器CS3.14搭建使用及流量分析
- CobaltStrike生成免杀shellcode
- CS-notes--一系列CS的使用技巧笔记
- 使用 Cobalt Strike 对 Linux 主机进行后渗透
- Cobalt Strike Listener with Proxy
- Cobalt Strike Convet VPN
- CS 4.0 SMB Beacon
- Cobalt Strike 浏览器跳板攻击
- Cobalt Strike 中 Bypass UAC
- 一起探索Cobalt Strike的ExternalC2框架
- 深入探索Cobalt Strike的ExternalC2框架
- Cobalt Strike的特殊功能(external_C2)探究
- A tale of .NET assemblies, cobalt strike size constraints, and reflection
- AppDomain.AssemblyResolve
- 从webshell建立代理上线不出网的内网机器
- 在Cobalt Strike BOF中进行直接系统调用
- Using Direct Syscalls in Cobalt Strike's Artifact Kit
- Cobalt Strike Staging and Extracting Configuration Information
4. CobaltStrike Hide
- CobaltStrike证书修改躲避流量审查
- CS 合法证书 + Powershell 上线
- Cobalt Strike 团队服务器隐匿
- 红队基础建设:隐藏你的C2 server
- Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite
- 深入研究cobalt strike malleable C2配置文件
- A Brave New World: Malleable C2
- How to Write Malleable C2 Profiles for Cobalt Strike
- Randomized Malleable C2 Profiles Made Easy
- 关于CobaltStrike的Stager被扫问题
- Beacon Stager listener 去特征
- 检测与隐藏Cobaltstrike服务器
- 记一次cs bypass卡巴斯基内存查杀
- Cobalt Strike – Bypassing C2 Network Detections
5. CobaltStrike Analysis
- Volatility Plugin for Detecting Cobalt Strike Beacon. blog|Toolset
- 逆向分析Cobalt Strike安装后门
- 分析cobaltstrike c2 协议
- Small tool to decrypt a Cobalt Strike auth file
- Cobalt Strike 的 ExternalC2
- Detecting Cobalt Strike Default Modules via Named Pipe Analysis
- 浅析CobaltStrike Beacon Staging Server扫描
- Striking Back at Retired Cobalt Strike: A look at a legacy vulnerability
- Analyzing Cobalt Strike for Fun and Profit
- Cobalt Strike Remote Threads detection
- The art and science of detecting Cobalt Strike
- A Multi-Method Approach to Identifying Rogue Cobalt Strike Servers
- How to detect Cobalt Strike activities in memory forensics
- Detecting Cobalt Strike by Fingerprinting Imageload Events
- The Anatomy of an APT Attack and CobaltStrike Beacon’s Encoded Configuration
- CobaltStrike - beacon.dll : Your No Ordinary MZ Header
- GitHub-hosted malware calculates Cobalt Strike payload from Imgur pic
- Detecting Cobalt Strike beacons in NetFlow data
- Volatility Plugin for Detecting Cobalt Strike Beacon
- Easily Identify Malicious Servers on the Internet with JARM
- Cobalt Strike Beacon Analysis
- Hancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike
- Attackers Exploiting WebLogic Servers via CVE-2020-14882 to install Cobalt Strike
- Hiding in the Cloud: Cobalt Strike Beacon C2 using Amazon APIs
- Identifying Cobalt Strike team servers in the wild
- Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature
- Operation Cobalt Kitty
- Detecting and Advancing In-Memory .NET Tradecraft
- Analysing Fileless Malware: Cobalt Strike Beacon
- IndigoDrop spreads via military-themed lures to deliver Cobalt Strike
- Cobalt Group Returns To Kazakhstan
- Striking Back at Retired Cobalt Strike: A look at a legacy vulnerability
- Azure Sentinel Quick-Deploy with Cyb3rWard0g’s Sentinel To-Go – Let’s Catch Cobalt Strike!
- Cobalt Strike stagers used by FIN6
- Malleable C2 Profiles and You
- C2 Traffic patterns including Cobalt Strike
- Cobalt Strike DNS Direct Egress Not That Far Away
- Detecting Exposed Cobalt Strike DNS Redirectors
- Example of Cleartext Cobalt Strike Traffic
- Cobaltstrike-Beacons analyzed
- 通过DNS协议探测Cobalt Strike服务器
- Detecting Cobalt Strike with memory signatures
- CobaltStrike通信中host字段的获取
6. CobaltStrike Video
- Malleable Memory Indicators with Cobalt Strike's Beacon Payload
- STAR Webcast: Spooky RYUKy: The Return of UNC1878
- Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection
- Profiling And Detecting All Things SSL With JA3
0x02 C2 Profiles
Type | Name | Description |
|---|---|---|
ALL | Official Malleable C2 Profiles | |
ALL | This script randomizes Cobalt Strike Malleable C2 profiles through the use of a metalanguage | |
ALL | Cobalt Strike Malleable C2 Design and Reference Guide | |
ALL | C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike. | |
ALL | A collection of Cobalt Strike Malleable C2 profiles. now have Windows Updates Profile | |
ALL | A Python interpreter for Cobalt Strike Malleable C2 profiles that allows you to parse, modify, build them programmatically and validate syntax. | |
ALL | Cobalt Strike的Malleable C2配置文件,被设计用来对抗流量分析 |
0x03 BOF
Type | Name | Description |
|---|---|---|
ALL | Various Cobalt Strike BOFs | |
ALL | Its larger goal is providing a code example and workflow for others to begin making more BOF files. Blog | |
ALL | Beacon Object File (BOF) Creation Helper | |
ALL | BOF DLL Inject is a custom Beacon Object File that uses manual map DLL injection in order to migrate a dll into a process all from memory. | |
ALL | BOF spawns a process of your choice under a specified parent, and injects a provided shellcode file via QueueUserAPC(). | |
ALL | Beacon Object File(BOF) for CobaltStrike that will acquire the necessary privileges and dump SAM - SYSTEM - SECURITY registry keys for offline parsing and hash extraction. | |
ALL | DCOM Lateral Movement; WMI Lateral Movement - Win32_Process Create; WMI Lateral Movement - Event Subscription | |
ALL | BOFs | ETW Patching; API Function Utility; Syscalls Shellcode Injection |
Dev | bof | This is a template project for building Cobalt Strike BOFs in Visual Studio. |
Dev | A .NET Runtime for Cobalt Strike's Beacon Object Files. | |
Dev | The format, described by Mudge here, asks that the operator construct an COFF file using a mingw-w64 compiler or the msvc compiler that holds an symbol name indicating its entrypoint, and underlying function calls. | |
Dev | Demonstrate the ability to easily use syscalls using inline assembly in BOFs. | |
Dev | A Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls to enable WDigest credential caching and circumvent Credential Guard (if enabled). | |
Dev | This Repo intends to serve two purposes. First it provides a nice set of basic situational awareness commands implemented in BOF. This allows you to perform some checks on a host before you begin executing commands that may be more invasive. | |
Dev | Custom implementation of DbgHelp's MiniDumpWriteDump function. Uses static syscalls to replace low-level functions like NtReadVirtualMemory. | |
Dev | This is a quick and dirty COFF loader (AKA Beacon Object Files). Currently can run un-modified BOF's so it can be used for testing without a CS agent running it. The only exception is that the injection related beacon compatibility functions are just empty. | |
Auxiliary | Cobalt Strike BOF to identify processes with the CLR loaded with a goal of identifying SpawnTo / injection candidates. | |
Auxiliary | A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific modules or process handles. | |
Auxiliary | BOF implementation of Chlonium tool to dump Chrome Masterkey and download Cookie/Login Data files | |
Auxiliary | BOF to call the SetThreadExecutionState function to prevent host from Sleeping | |
Auxiliary | Beacon Object File to dump Lsass memory by obtaining a snapshot handle. Does MiniDumpWriteDump/NtReadVirtualMemory on SnapShot of LSASS instad of original LSASS itself hence evades some AV/EDR. | |
Auxiliary | get system by duplicating winlogon's token. | |
Auxiliary | Silent Lsass Dump | |
Auxiliary | This is a Beacon Object File to refresh DLLs and remove their hooks. | |
Auxiliary | This aggressor script uses a beacon's note field to indicate the health status of a beacon. | |
Auxiliary | A beacon object file for use with cobalt strike v4.1+. Supports querying, adding, and deleting keys/values of local and remote registries. | |
Auxiliary | InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module | |
Auxiliary | CredBandit is a proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel. The memory dump is done by using NTFS transactions which allows us to write the dump to memory and the MiniDumpWriteDump API has been replaced with an adaptation of ReactOS's implementation of MiniDumpWriteDump. | |
Auxiliary | Cobalt Strike Beacon Object File (BOF) that bypasses AMSI in a remote process with code injection. | |
Exploit | SMBGhost LPE | |
Exploit | ZeroLogon | |
Persistence | Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing. |
Последнее редактирование: