Cobalt-Strike / community_kitLinks
Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and scripts have been written and published, but they can be challenging to locate. Community Kit is a central repository of extensions written by the user community to extend the capabilities of Cobalt Strike. The…
☆369Updated this week
Alternatives and similar repositories for community_kit
Users that are interested in community_kit are comparing it to the libraries listed below
Sorting:
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆375Updated 2 years ago
- PowerShell Script Obfuscator☆559Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆966Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆517Updated 2 weeks ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,250Updated last year
- ☆212Updated 5 years ago
- ☆713Updated last year
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆412Updated 10 months ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆558Updated 2 years ago
- ☆1,001Updated 4 months ago
- This repository contains scripts, configurations and deprecated payload loaders for Brute Ratel C4 (https://bruteratel.com/)☆273Updated 11 months ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,086Updated 2 years ago
- "Golden" certificates☆691Updated 10 months ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆978Updated 2 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆767Updated 2 months ago
- XLL Phishing Tradecraft☆424Updated 3 years ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆272Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆264Updated last year
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆897Updated 8 months ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆489Updated 2 years ago
- Simple & Powerful PowerShell Script Obfuscator☆570Updated last month
- ☆788Updated 2 years ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆796Updated 2 years ago
- a tool to help operate in EDRs' blind spots☆742Updated 7 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆556Updated 3 years ago
- Command and Control Framework written in C#☆412Updated last year
- Some notes and examples for cobalt strike's functionality☆1,093Updated 3 years ago
- ☆469Updated 7 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆333Updated 8 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Updated last year