Cobalt-Strike / community_kit
Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be challenging to locate. Community Kit is a central repository of extensions written by the user community to extend the capabilities of Cobalt Strike. The…
☆334Updated this week
Alternatives and similar repositories for community_kit:
Users that are interested in community_kit are comparing it to the libraries listed below
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆354Updated last year
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,063Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,179Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆897Updated 8 months ago
- Some notes and examples for cobalt strike's functionality☆1,002Updated 3 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆255Updated last year
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆474Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆671Updated last week
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆390Updated 5 months ago
- PowerShell Script Obfuscator☆513Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆462Updated 4 months ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆952Updated 2 years ago
- Various Cobalt Strike BOFs☆612Updated 2 years ago
- Open source C2 server created for stealth red team operations☆797Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆515Updated 2 years ago
- The Hunt for Malicious Strings☆1,167Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆417Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,063Updated 10 months ago
- ☆923Updated last month
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆698Updated last year
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆283Updated 2 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,040Updated 7 months ago
- Cobalt Strike kit for Lateral Movement☆661Updated 4 years ago
- "Golden" certificates☆654Updated 6 months ago
- ☆695Updated 10 months ago
- ☆187Updated 4 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆742Updated last year
- ☆404Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆430Updated last year
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆267Updated 6 months ago