BC-SECURITY / Malleable-C2-ProfilesView external linksLinks
Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
☆389Jun 11, 2023Updated 2 years ago
Alternatives and similar repositories for Malleable-C2-Profiles
Users that are interested in Malleable-C2-Profiles are comparing it to the libraries listed below
Sorting:
- Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.…☆862Oct 28, 2022Updated 3 years ago
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,750Dec 13, 2023Updated 2 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,097Jun 25, 2024Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆768Sep 4, 2024Updated last year
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,098Apr 19, 2023Updated 2 years ago
- Various Cobalt Strike BOFs☆736Oct 16, 2022Updated 3 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,192Apr 16, 2025Updated 9 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆741Jul 22, 2023Updated 2 years ago
- Some notes and examples for cobalt strike's functionality☆1,125Feb 8, 2022Updated 4 years ago
- Situational Awareness commands implemented using Beacon Object Files☆1,712Jan 5, 2026Updated last month
- ☆1,117Jan 6, 2026Updated last month
- Cobalt Strike random C2 Profile generator☆685Jan 5, 2023Updated 3 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆509May 19, 2025Updated 8 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,398Nov 22, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,004Jun 4, 2024Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,164Mar 31, 2021Updated 4 years ago
- Cobalt Strike Shellcode Generator☆669Jan 8, 2025Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆671Aug 15, 2025Updated 6 months ago
- Creating a repository with all public Beacon Object Files (BoFs)☆572Aug 30, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,364Oct 27, 2023Updated 2 years ago
- Cobalt Strike kit for Lateral Movement☆678Feb 21, 2020Updated 5 years ago
- Collection of Beacon Object Files☆633Nov 1, 2022Updated 3 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆883Sep 9, 2022Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆482Jul 12, 2023Updated 2 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆400Updated this week
- Tool to bypass LSA Protection (aka Protected Process Light)☆986Dec 4, 2022Updated 3 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,594Jul 10, 2023Updated 2 years ago
- "Golden" certificates☆710Aug 17, 2024Updated last year
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆503May 16, 2023Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆830Dec 2, 2023Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,579May 18, 2021Updated 4 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 2 months ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 2 years ago
- The Hunt for Malicious Strings☆1,358May 13, 2025Updated 9 months ago
- .NET project for installing Persistence☆496Jun 26, 2024Updated last year
- C# implementation of harmj0y's PowerView☆1,083Mar 22, 2024Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆372Sep 20, 2025Updated 4 months ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆600Jul 22, 2022Updated 3 years ago