NexusFuzzy / CobaltSpam
Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons
☆368Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for CobaltSpam
- Cobalt Strike random C2 Profile generator☆627Updated last year
- Hunts out CobaltStrike beacons and logs operator command output☆887Updated 2 months ago
- Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.…☆767Updated 2 years ago
- ☆446Updated 3 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆900Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,014Updated 4 months ago
- Convert Cobalt Strike profiles to modrewrite scripts☆583Updated last year
- Code and yara rules to detect and analyze Cobalt Strike☆262Updated 3 years ago
- Cobalt Strike Shellcode Generator☆636Updated 10 months ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,041Updated 7 months ago
- .NET Project for Attacking vCenter☆538Updated 3 years ago
- ☆290Updated 4 months ago
- ☆1,022Updated 11 months ago
- Self-developed tools for Lateral Movement/Code Execution☆692Updated 3 years ago
- Cobalt Strike kit for Persistence☆465Updated 4 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆338Updated last year
- Cobalt Strike kit for Lateral Movement☆647Updated 4 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆457Updated 2 years ago
- Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on☆532Updated last year
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆512Updated 11 months ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆726Updated 11 months ago
- Amplify network visibility from multiple POV of other hosts☆299Updated 7 months ago
- Run shellcode from resource☆253Updated 3 years ago
- Cobalt Strike Python API☆292Updated 2 years ago
- ☆378Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆361Updated 2 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆532Updated 4 years ago
- Persistence by writing/reading shellcode from Event Log☆367Updated 2 years ago