跳转到帖子

CobaltStrike优质学习资源

recommended_posts

发布于
  • Members

0x00 前言

  1. 第一部分是关于CobaltStrike优质文章的集合
  2. 关于新特性BOF资源的整合
  3. 解决要用的时候找不到合适aggressor script或者BOF的问题
  4. 如果有本repo没有涉及的优质内容,欢迎大家提交pr

0x01 相关文章合集

1. 基础知识参考

  1. Cobalt_Strike_wiki
  2. CobaltStrike4.0笔记
  3. cobaltstrike4.1笔记
  4. CobaltStrike相关网络文章集合
  5. Cobalt Strike 外部 C2【一、原理篇】
  6. Cobalt Strike 桌面控制问题的解决(以及屏幕截图等后渗透工具)
  7. Cobalt Strike & MetaSploit 联动

2. 破解以及定制参考

  1. IntelliJ-IDEA修改cobaltstrike
  2. CobaltStrike二次开发环境准备
  3. Cobal Strike 自定义OneLiner
  4. 通过反射DLL注入来构建后渗透模块(第一课)
  5. Cobalt Strike Aggressor Script (第一课)
  6. Cobalt Strike Aggressor Script (第二课)

3. 使用技巧参考

  1. Cobalt Strike Spear Phish
  2. run CS in win -- teamserver.bat
  3. Remote NTLM relaying through CS -- related to CVE_2018_8581
  4. Cobalt Strike Convet VPN
  5. 渗透神器CS3.14搭建使用及流量分析
  6. CobaltStrike生成免杀shellcode
  7. CS-notes--一系列CS的使用技巧笔记
  8. 使用 Cobalt Strike 对 Linux 主机进行后渗透
  9. Cobalt Strike Listener with Proxy
  10. Cobalt Strike Convet VPN
  11. CS 4.0 SMB Beacon
  12. Cobalt Strike 浏览器跳板攻击
  13. Cobalt Strike 中 Bypass UAC

4. CobaltStrike隐匿参考

  1. CobaltStrike证书修改躲避流量审查
  2. CS 合法证书 + Powershell 上线
  3. Cobalt Strike 团队服务器隐匿

5. CobaltStrike分析参考

  1. Volatility Plugin for Detecting Cobalt Strike Beacon. blog|Toolset
  2. 逆向分析Cobalt Strike安装后门
  3. 分析cobaltstrike c2 协议
  4. Small tool to decrypt a Cobalt Strike auth file

0x02 C2 Profiles

TypeNameDescriptionPopularityLanguage
ALLMalleable-C2-ProfilesOfficial Malleable C2 Profilesa5hls0gkn1x13019.pngx5omzavrlss13021.png
ALLMalleable-C2-RandomizerThis script randomizes Cobalt Strike Malleable C2 profiles through the use of a metalanguagevgzltdwk4aq13023.pngzec3yoeu4el13024.png
ALLmalleable-c2Cobalt Strike Malleable C2 Design and Reference Guidegoal52uop0q13025.pngyqchpatrs3z13026.png
ALLC2concealerC2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.lekmlyparub13028.png0mf135551fw13029.png

0x03 BOF

TypeNameDescriptionPopularityLanguage
ALLBOF_CollectionVarious Cobalt Strike BOFs3xe4volu5fo13031.pngyu22xeptcr413032.png
ALLSituational Awareness BOFIts larger goal is providing a code example and workflow for others to begin making more BOF files. Blogbxykbvqlnyt13033.pnggq24rggjdiy13035.png
ALLQueueUserAPC_PPIDBOF spawns a process of your choice under a specified parent, and injects a provided shellcode file via QueueUserAPC().oubzqyuhtr113036.pngsterlqlup0u13038.png
ALLbof_helperBeacon Object File (BOF) Creation Helperszhxbndnymv13039.pngp2evpxx2w4g13040.png

0x04 Aggressor Script

TypeNameDescriptionPopularityLanguage
BypassAVBypassAV用于快速生成免杀的可执行文件tsgb3so5kj013041.pngngqi3xz1mic13042.png
BypassAVscrunBypassAV ShellCode Loader (Cobaltstrike/Metasploit) Useage2k5s2e05knq13043.pngagwmdvkxjmc13044.png
BypassAVbeacon-c2-gobeacon-c2-go (Cobaltstrike/Metasploit)qm2haxv2y2e13045.pngyaobohwseal13046.png
BypassAVC--Shellcodepython ShellCode Loader (Cobaltstrike&Metasploit) Useagel2uwf4cfbty13047.pngnp4bwkhin4r13048.png
Reconred-team-scriptsperform some rudimentary Windows host enumeration with Beacon built-in commandsvuzkgkbjo0y13049.png2icjrir2vqo13050.png
Reconaggressor-powerviewAll functions listed in the PowerView about page are included in this with all arguments for each function. PowerViewpkikzwebkan13051.pngjeyiqfn33ed13052.png
ReconPowerView3-AggressorPowerView Aggressor Script for CobaltStrike PowerViewavy4gkrhbgc13053.pngnqfprnsl0tj13054.png
ReconAggressorScriptsSharphound-Aggressor- A user menu for the SharpHound ingestorihc2hwcalqy13055.pngsgd4r5xi0f113056.png
ReconServerScan内网横向信息收集的高并发网络扫描、服务探测工具。mhhpemgh42s13057.pngwv2xtz0jsi513058.png
ExploitXSS-Fishing2-CS鱼儿在cs上线后自动收杆 / Automatically stop fishing in javascript after the fish is hookedhvegyizpyfi13059.png0tymmzizvnf13060.png
ExploitXSS-Phishingxss钓鱼,cna插件配合php后端收杆5puvbefiok513061.pngngjlh421u3n13062.png
Exploitcustom_payload_generatorCobaltStrike3.0+ --> creates various payloads for Cobalt Strike's Beacon. Current payload formatsollgcf20q4s13063.pngniam3a2hikg13064.png
ExploitCrossC2CrossC2 framework - Generator CobaltStrike's cross-platform beacon3tbwpqob04313066.pngyt3e01icm0m13067.png
ExploitGECCGo External C2 Client implementation for cobalt strike.5jcxdbkb0xp13068.png4cahkqyycdu13069.png
ExploitCobaltstrike-MS17-010ms17-010 exploit tool and scanner.q251z3z0bzp13070.pngbn5mu12ovqu13071.png
ExploitAES-PowerShellCodeStandalone version of my AES Powershell payload for Cobalt Strike.noc10vpicxy13072.png13r20krxdou13075.png
ExploitSweetPotato_CSCobaltStrike4.x --> SweetPotatocfkubkhjdgg13077.pngomppy2p2kqr13079.png
ExploitElevateKitprivilege escalation exploitsf1atkwiaveh13081.png3t2zgv44gty13083.png
ExploitCVE-2018-4878CVE-2018-4878m1fcokaarcy13084.pngxlzyhdglamm13085.png
ExploitAggressor-ScriptsThe only current public is UACBypass, whose readme can be found inside its associated folder.0v2ep14dw1j13086.png2vnfqbdi1t413087.png
ExploitCVE_2020_0796_CNA基于ReflectiveDLLInjection实现的本地提权漏洞vai1vuop12413088.png2kedr4s0kmu13089.png
ExploitDDEAutoCSsetup our stage(d) Web Delivery attackdkm4bb3yaxz13090.pngqilwtoz1fgf13093.png
ExploitgeaconImplement CobaltStrike's Beacon in Go (can be used in Linux)kd0mojomnrt13095.pngeb4viauwku513096.png
Persistencepersistence-aggressor-scriptpersistence-aggressor-scriptsfm22pt2u3n13097.pngw4tomjkjkkc13098.png
PersistencePeinject_dll弃用winexec函数,使用shellexecute函数,程序流不在卡顿,达到真正的无感。m1bgrkwndjr13100.pnghcm5ud0j0k213101.png
PersistenceTikiTorchTikiTorch follows the same concept(CACTUSTORCH) but has multiple types of process injection available, which can be specified by the user at compile time.ikjjoudydzf13102.pngm3xwxiynzef13103.png
PersistenceCACTUSTORCHA JavaScript and VBScript shellcode launcher. This will spawn a 32 bit version of the binary specified and inject shellcode into it.ffgirtjv0ys13105.pngoxcbvwioa1x13106.png
PersistenceUploadAndRunFrp上传frpc并且运行frpc12l4gqtjmwi13107.pngwmv4dduig4e13108.png
Persistencepersistence-aggressor-scriptPersistence Aggressor Scriptqdo5ru45yn513109.pngsdgwnlqpdhe13111.png
AuxiliaryCobaltstrike-atexec利用任务计划进行横向,需要与135端口、445端口进行通信ijs00lqcdif13112.pngazpbb3hmgda13113.png
AuxiliarySharpCompileSharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime.i0t0v3wvwyp13114.pngz1tprq2h0zt13115.png
AuxiliaryQuickrundownUtilizing QRD will allow an operator to quickly characterize what processes are both known and unknown on a host through the use of colors and notes about the processes displayed.cixos0qzwvc13116.pnghli25cekbd213117.png
AuxiliaryPhant0m_cobaltstrikeThis script walks thread stacks of Event Log Service process (spesific svchost.exe) and identify Event Log Threads to kill Event Log Service Threads. So the system will not be able to collect logs and at the same time the Event Log Service will appear to be running.mqiv2prpcqz13118.pngk5l4omg043w13119.png
AuxiliaryNoPowerShellNoPowerShell is a tool implemented in C# which supports executing PowerShell-like commands while remaining invisible to any PowerShell logging mechanisms.310us3in5zp13120.pngejgfttdug4c13121.png
AuxiliaryEventLogMasterRDP EventLog Masterd4kecqlwfjl13122.pngl2qfk34kqyc13123.png
AuxiliaryANGRYPUPPYBloodhound Attack Path Execution for Cobalt Strike0ofrhvlyqtq13124.pngo1kmuyszcic13125.png
AuxiliaryCobaltStrike_Script_Wechat_Push上线微信提醒的插件,通过微信Server酱提醒nwggixneawx13126.pngh15aji1gxyc13127.png
AuxiliaryCS-Aggressor-Scriptsslack and webhooks reminder5x1lk2ffgiq13128.pngetlp5fufoy313129.png
AuxiliaryAggressor-Scriptssurveying of powershell on targets (在对应的目标上检测powershell的相关信息)ouzaa4wxtqi13130.pngvn5tsr5qgey13131.png
Auxiliarycs-magikImplements an events channel and job queue using Redis for Cobalt Strike.fv1ce3vs51y13132.pngq4ftpbtod2y13133.png
AuxiliaryAggressorScripts查看进程的时候讲av进程标注为红色3tyu5ypbqbq13134.pngrs114345qwo13135.png
AuxiliaryRavenCobaltStrike External C2 for Websocketsrcduqra2twl13136.png54qnqjeug4c13137.png
AuxiliaryCobaltStrikeParserPython parser for CobaltStrike Beacon's configurationbfyedv23ikw13139.pnghfethgftubw13141.png
AuxiliaryfakelogonscreenFakeLogonScreen is a utility to fake the Windows logon screen in order to obtain the user's password.ehixryzlqrp13143.pngs1bb0hacqfw13144.png
AuxiliarySyncDogMake bloodhound sync with cobaltstrike.tjy2snj0a4p13146.pngctvqcxcfqbo13147.png
SynthesisErebusCobaltStrike4.x --> Erebus CobaltStrike后渗透测试插件3dpwbungs1g13148.png03nfflradai13150.png
SynthesisCobalt-Strike-Aggressor-ScriptsCobaltStrike后渗透测试插件集合 Usage3yfwvnunuid13151.pngiotfcflurzq13152.png
SynthesisAggressorScriptsAggressor scripts for use with Cobalt Strike 3.0+fzo1qzegnmg13154.pngcvxfws2c2ip13155.png
SynthesisRedTeamToolsRedTeamTools for use with Cobalt Striketv52bhwzv3n13157.pngs12g0yonvqw13158.png
Synthesiscobalt-arsenalAggressor Scripts for Cobalt Strike 4.0+hwoxvuzixrg13160.pngjqdgeb5h3rl13161.png
SynthesisMoveKitThe aggressor script handles payload creation by reading the template files for a specific execution type. introoig3u2ub33l13163.png1mfii4ckan313165.png
SynthesisStayKitThe aggressor script handles payload creation by reading the template files for a specific execution type. introvu41y54kyeq13166.pngccxyx2fhs1y13169.png
SynthesisAggressorScriptsAggressorScripts300xw0u2pwr13170.pngt4xhfisqrb213172.png
SynthesisAggressorScriptsCollection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sourcesh4n0gvupjen13173.pngzflejz0ie0k13175.png
SynthesisAggressorScriptsAggressorScriptseb51ynnmdif13176.png1xprtqw0twy13177.png
SynthesisAggressor-VYSECContains a bunch of CobaltStrike Aggressor Scriptsg0wj0mmlz4h13179.pngimvdnlo5oax13180.png
SynthesisAggressorAssessorAggressorAssessorkl4zkz251ge13181.pngmhvbqlkiwss13182.png
SynthesisAggressorAssessorAggressorAssessoreon3yrpv2qh13183.pngesby121zdl313184.png
Synthesisaggressor-scriptsCollection of Cobalt Strike Aggressor Scripts13je55aozjg13185.pnguwovuen411113186.png
SynthesisAggressor-scriptsThis is just a random collection of Aggressor Scripts I've written for Cobalt Strike 3.x. (其中有一个debug脚本比较好用)rst0wzefq5q13187.pngdsfbzvl5j4r13188.png
SynthesisAggressor-ScriptCollection of Aggressor Scripts for Cobalt Strike(主要包含了提权和权限维持脚本)ggdhwpsjbwq13189.pngag1cul5pe4v13190.png
SynthesisAggressor-ScriptAggressor Script, Kit, Malleable C2 Profiles, External C2 and so onz4mppgvgnnz13191.png1f1os0gkos213192.png
Synthesisaggressor_scripts_collectionCollection of various aggressor scripts for Cobalt Strike from awesome people. Will be sure to update this repo with credit to each person.ykqzpu3bbyf13193.pngrbetdjwx3so13194.png
SynthesisCobaltStrike-ToolKitgooglesearch.profile and script related to AD.zyrjx0esai313195.pngiirfcatwbd413196.png
SynthesisArsenalCobalt Strike 3.13 Arsenal Kitwyy54dri0up13197.pngv1lzt512c1513198.png
Synthesiscobalt-arsenalMy collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+wopnx2f4abb13199.pngqvpuywkg5jx13200.png
Synthesisaggressor_scriptscode execution via DCOM;the privilege escalation techniques included in ElevateKit;etc.ffabhpfg3ow13202.pngyjcg5u14dhh13204.png
Synthesisaggressor_scriptscode execution via DCOM;the privilege escalation techniques included in ElevateKit;etc.mfg2dmswe5k13206.pnggnfe0i2zetq13207.png
Synthesisaggressorcreating tunnels with netsh; changed default to bit.ly redirect to mcdonalds;using powershell to kill parent process;btv2v33eyzp13209.pngd1eb1qji2fl13211.png
SynthesisCobaltStrikeCNAA collection of scripts - from various sources - see script for more info.eensoog0peg13212.pngp3ngxykolwl13216.png
SynthesisAggressorScriptsHighlights selected processes from the ps command in beacon;Loads various aliases into beacon;sets a few defaults for scripts to be used later..15o0nafvgol13218.pngjrj0dqowk0w13221.png
SynthesisAggressorAssessor从C2生成到横向移动的全辅助脚本套件5vyz2upjg0213222.png0esx4voczk213224.png
SynthesisAggressorCollectionCollection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authorsi1fbavg5apk13226.png2qffd41ojan13227.png
SynthesisCobaltstrike-Aggressor-Scripts-CollectionThe collection of tested cobaltstrike aggressor scripts.ad4gxswlmak13229.pngal3bvb5ning13231.png
SynthesisaggressorScriptsCobaltStrike AggressorScripts for the lazye14loyjvjt513232.pngdtidujoago313234.png
Synthesiscobalt_strike_extension_kit集成了SharpHound,SharpRDP,SharpWMI等在内的各种内网工具,使用AggressorScripts构建workflownird5a2ehrr13235.pngdi23etacj2j13237.png

0x05 Related Tools

TypeNameDescriptionPopularityLanguage
AntiCScobaltstrike_bruteCobalt Strike Team Server Password Brute Forcer2fwaxjfseyp13239.pnghxvlyikerjq13241.png
AuxiliaryredshellAn interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server.1recmkovacl13243.pngsx3zskdl3g213244.png
AuxiliaryAnsible-Cobalt-StrikeAn Ansible role to install cobalt-strike on debian based architectures, let's be honest it's for kali.ayhg1zx025j13246.pnggu0fzl5kphe13247.png
SynthesisrediAutomated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)v3nl0ageehs13249.pngnnkf0xtqmgk13251.png
Synthesiscs2modrewriteAutomatically Generate Rulesets for Apache mod_rewrite or Nginx for Intelligent HTTP C2 Redirectionp4zydlhbtom13252.png0dsanti040s13253.png
SynthesisRed-EC2Deploy RedTeam Specific EC2 via ansible.)i2mvf0yeelz13254.png2stqnzaxrp213255.png

0x06 Source Code

TypeNameDescription
Sourcecobalt-strike-sourceCobalt Strike 3.12 Source Code (Decompiled and Fixed)

  • 查看数 738
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…