strozfriedberg / cobaltstrike-config-extractorView external linksLinks
Cobalt Strike Beacon configuration extractor and parser.
☆160Oct 30, 2025Updated 3 months ago
Alternatives and similar repositories for cobaltstrike-config-extractor
Users that are interested in cobaltstrike-config-extractor are comparing it to the libraries listed below
Sorting:
- ☆1,129Dec 19, 2023Updated 2 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆520Jul 15, 2022Updated 3 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆951Sep 4, 2024Updated last year
- ☆33Feb 26, 2022Updated 3 years ago
- ☆452Aug 4, 2021Updated 4 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated 11 months ago
- Extendable payload obfuscation and delivery framework☆146Nov 4, 2022Updated 3 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆114Aug 23, 2021Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆152Sep 3, 2020Updated 5 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆273May 5, 2021Updated 4 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆923Aug 19, 2021Updated 4 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆482Jul 12, 2023Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆323Sep 23, 2022Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆185Jun 23, 2025Updated 7 months ago
- .NET implementation of Cobalt Strike's External C2 Spec☆90Nov 12, 2021Updated 4 years ago
- Move CS beacon to GPU memory when sleeping☆251Nov 19, 2021Updated 4 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Defences against Cobalt Strike☆1,293Jul 14, 2022Updated 3 years ago
- Jsp Decoder Source Code☆16Mar 23, 2021Updated 4 years ago
- Aims to identify sleeping beacons☆659Jan 25, 2026Updated 2 weeks ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- ☆55Nov 11, 2021Updated 4 years ago
- A Visual Studio template used to create Cobalt Strike BOFs☆323Nov 17, 2021Updated 4 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆301Sep 28, 2021Updated 4 years ago
- Active C&C Detector☆155Oct 5, 2023Updated 2 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Aug 4, 2021Updated 4 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- Initial triage of Windows Event logs☆106Jun 16, 2024Updated last year
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆148Sep 8, 2022Updated 3 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- Automatically create YARA rules from malicious documents.☆212May 16, 2022Updated 3 years ago