About CobaltStrike & C2
Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons
.NET, PE, & Raw Shellcode Packer/Loader Written in Nim
Loader that loads shellcode from UUID's
Cobalt Strike random C2 Profile generator
Cobalt Strike Malleable C2 Design and Reference Guide
C2 Powershell Command & Control Framework with BuiltIn Commands
The Minimalistic x86/x64 API Hooking Library for Windows
A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/
Scan files or process memory for CobaltStrike beacons and parse their configuration
A header-only DLL proxy stub generation library built with C++20.
CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能
Practice Go programming and implement CobaltStrike's Beacon in Go
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.
A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl
This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions