Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
☆391Jun 11, 2023Updated 2 years ago
Alternatives and similar repositories for Malleable-C2-Profiles
Users that are interested in Malleable-C2-Profiles are comparing it to the libraries listed below
Sorting:
- Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.…☆871Oct 28, 2022Updated 3 years ago
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,751Dec 13, 2023Updated 2 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,097Jun 25, 2024Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆772Sep 4, 2024Updated last year
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,097Apr 19, 2023Updated 2 years ago
- Various Cobalt Strike BOFs☆744Oct 16, 2022Updated 3 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,199Apr 16, 2025Updated 10 months ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆741Jul 22, 2023Updated 2 years ago
- Some notes and examples for cobalt strike's functionality☆1,128Feb 8, 2022Updated 4 years ago
- Situational Awareness commands implemented using Beacon Object Files☆1,728Feb 23, 2026Updated 2 weeks ago
- Remote operations commands implemented using Beacon Object Files☆1,120Feb 23, 2026Updated 2 weeks ago
- Cobalt Strike random C2 Profile generator☆685Jan 5, 2023Updated 3 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆510May 19, 2025Updated 9 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,400Nov 22, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,006Jun 4, 2024Updated last year
- Cobalt Strike Shellcode Generator☆669Jan 8, 2025Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆677Aug 15, 2025Updated 6 months ago
- Cobalt Strike kit for Lateral Movement☆678Feb 21, 2020Updated 6 years ago
- Creating a repository with all public Beacon Object Files (BoFs)☆601Mar 2, 2026Updated last week
- Collection of Beacon Object Files☆633Nov 1, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,369Oct 27, 2023Updated 2 years ago
- Aggressor scripts for use with Cobalt Strike 3.0+☆887Sep 9, 2022Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆482Jul 12, 2023Updated 2 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆404Updated this week
- Tool to bypass LSA Protection (aka Protected Process Light)☆989Dec 4, 2022Updated 3 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆502May 16, 2023Updated 2 years ago
- "Golden" certificates☆708Aug 17, 2024Updated last year
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,607Jul 10, 2023Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆839Dec 2, 2023Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,584May 18, 2021Updated 4 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 3 years ago
- The Hunt for Malicious Strings☆1,365May 13, 2025Updated 9 months ago
- .NET project for installing Persistence☆498Jun 26, 2024Updated last year
- ☆1,531Aug 11, 2023Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆603Jul 22, 2022Updated 3 years ago
- TCP Port Redirection Utility☆762Jan 31, 2023Updated 3 years ago