• XSS.stack #1 – первый литературный журнал от юзеров форума

CobaltStrike 4.7 Aggressor scripts & Clean & Bypassed EDR/AV's service included.

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.

r1z

Still(In)Secure
КИДАЛА
Регистрация
19.07.2019
Сообщения
938
Реакции
822
Гарант сделки
30
Пожалуйста, обратите внимание, что пользователь заблокирован
Holla!

This is a sale of the latest CobaltStrike 4.7 Licened for sale with the latest kits (17/08/22).

August 17th, 2022 - Cobalt Strike 4.7
-------------
+ Added new memory options to the Malleable C2 Profile for BOF execution, allowing users to define how BOFs live in memory.
+ Updated how Beacon processes BOFs
BOF memory sections are now located together, this resolves issues where BOFs may not run because the address offset is > 4GB.
Added support for additional relocation types.
Increased the number of available dynamic functions from 32 to 64.
+ Added SOCKS5 proxy server support, including DNS resolution and UDP support.
+ Updated Sleep mask to be executed as a BOF.
Sleep mask size limit increased from 769 to 8192 bytes.
+ Updated module stomping to support the ability to specify the starting ordinal when searching for exported functions.
+ Updated steal_token to enable it to steal tokens from processes that it previously couldn't get to, by making the access mask customizable.
Also updated the steal_token dialog in the UI to make it easier to set the access mask.
+ Added an option to import credentials on the "View - Credentials" list. Added an additional export option to facilitate this.
+ Added a stageless payload generator dialog that allows you to set either "thread" or "process" as the exit option.
+ Added a new command "clipboard" to steal the contents of the Windows clipboard.
Also added an Aggressor Script function "bclipboard" to steal the contents of the Windows clipboard.
+ Updated Beacon interactions in the UI. Double-clicking a Beacon now open the Beacon console (i.e. interact with the Beacon).
+ Added a preference to set whether to display the teamserver tab bar at all times (unchecked by default).
+ Added a new menu item to allow the user to generate x86 and x64 stageless payloads for all available payload variants at once.
Also added a new Aggressor Script function "all_payloads" to do this without showing the dialog.
+ Updated File Browser processing to ensure that actions are displayed on the Beacon console and logged in the activity report in the same way as when the "ls" command is run.
+ Updated Process Browser processing to ensure that actions are displayed on the Beacon console and logged in the activity report in the same way as when the "ps" command is run.
+ Added a sleep time tracking feature.
The sleep time for each Beacon is recorded and displayed in a new column in the Beacon table view
Sleep time is persisted between teamserver restarts.
+ Added a Beacon Health feature that uses the sleep time and last checkin time for each Beacon to indicate whether the Beacon is active, disconnected or dead.
+ Updated the icons used in the UI and simplified the toolbar, removing buttons for some of the less popular functions.
+ Added a dark mode option to the UI.
+ Updated the main menu to flatten out and reorganise some of the menus.
+ Added a new dialog that displays default shortcut keys (Help -> Default Shortcut Keys)
+ Updated Beacon and SSH console timestamps. They are both now on by default.
+ Updated the Beacon status bar to display more information.
The left section now displays hostname, host OS bitness (x86 or x64), username, process ID, process bitness (x86 or x64), parent process ID (linked Beacons only), Beacon note (truncated if > 50 characters).
The right section now displays last connection time.
+ Updated the event status bar to include the teamserver local IP and number of Beacons.
+ Added two new Beacon console commands.
"file_browser" opens the File Browser.
"process_browser" opens the Process Browser.
+ Updated the Beacon right-click menu. Changes made to Beacon, SSH, Graph and Targets options.
+ Added automatic parsing and resolution of Windows error codes.
Added a new Beacon console command "windows_error_code" that can be independently used to convert a Windows error code to a message.
Added a new Aggressor Script function "windows_error_code" that can be used to convert a Windows error code to a message.
+ Updated the "ps" command output.
Parent/child process relationships are resolved and displayed as a tree.
+ Updated the images used for Beacons, sessions and targets in the pivot chart and table views.
+ Updated the Aggressor Script function "setup_reflective_loader" to output the ReflectiveLoader function offset to the script console.
+ Fixed reliability issues around how copy/paste works. Text is now reliably copied to the clipboard.

There is a new OPSEC service which is not-documented at all, and you will have it as a one-time setup, or monthly subscribe.
  • Nmap scanner. (blocked)✔
  • BeaconEye scanner (blocked) ✔
  • Cobalt parser. (blocked) ✔
  • Hidden URI aka checksum8. (hidden) ✔
  • Hide your Teamserver under CloudFlared Tunnel ✔
  • Steal SSL for your target company. (bypassed) ✔
  • Bypass most moderm EDR's. (bypassed) ✔
  • and / or Install TOR over Teamserver.
  • and / or Install OpenVPN with redirector.
  • and / or Install DNSCrypt (DoH) via CloudFlare.
  • and / or Install Domains Randomizor.
  • and / or Install JARM randomizor aka JA3's obfuscator.

There is an options to purchace anonymously domain for your teamserver or redirector(s) and/or order anonymously VPS with extra mount, discussed in PM.

For orders, write in PM or in TOX:
A5852A300E402AD8AA973E1147D024FFE7DCF34BCC203C7B9DFB8560A3B10361000000000003

XSS Escrow accepted.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Hello buddy, please send me prices and plans! Thanks
Sent, and please for the rest of potentiol buyers, write in PM or in TOX.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Статус
Закрыто для дальнейших ответов.
Верх