跳转到帖子

游客您好,欢迎来到黑客世界论坛!您可以在这里进行注册。

赤队小组-代号1949(原CHT攻防小组)在这个瞬息万变的网络时代,我们保持初心,创造最好的社区来共同交流网络技术。您可以在论坛获取黑客攻防技巧与知识,您也可以加入我们的Telegram交流群 共同实时探讨交流。论坛禁止各种广告,请注册用户查看我们的使用与隐私策略,谢谢您的配合。小组成员可以获取论坛隐藏内容!

TheHackerWorld官方

CobaltStrike优质学习资源

精选回复

发布于

0x00 前言

  1. 第一部分是关于CobaltStrike优质文章的集合
  2. 关于新特性BOF资源的整合
  3. 解决要用的时候找不到合适aggressor script或者BOF的问题
  4. 如果有本repo没有涉及的优质内容,欢迎大家提交pr

0x01 相关文章合集

1. 基础知识参考

  1. Cobalt_Strike_wiki
  2. CobaltStrike4.0笔记
  3. cobaltstrike4.1笔记
  4. CobaltStrike相关网络文章集合
  5. Cobalt Strike 外部 C2【一、原理篇】
  6. Cobalt Strike 桌面控制问题的解决(以及屏幕截图等后渗透工具)
  7. Cobalt Strike & MetaSploit 联动

2. 破解以及定制参考

  1. IntelliJ-IDEA修改cobaltstrike
  2. CobaltStrike二次开发环境准备
  3. Cobal Strike 自定义OneLiner
  4. 通过反射DLL注入来构建后渗透模块(第一课)
  5. Cobalt Strike Aggressor Script (第一课)
  6. Cobalt Strike Aggressor Script (第二课)

3. 使用技巧参考

  1. Cobalt Strike Spear Phish
  2. run CS in win -- teamserver.bat
  3. Remote NTLM relaying through CS -- related to CVE_2018_8581
  4. Cobalt Strike Convet VPN
  5. 渗透神器CS3.14搭建使用及流量分析
  6. CobaltStrike生成免杀shellcode
  7. CS-notes--一系列CS的使用技巧笔记
  8. 使用 Cobalt Strike 对 Linux 主机进行后渗透
  9. Cobalt Strike Listener with Proxy
  10. Cobalt Strike Convet VPN
  11. CS 4.0 SMB Beacon
  12. Cobalt Strike 浏览器跳板攻击
  13. Cobalt Strike 中 Bypass UAC

4. CobaltStrike隐匿参考

  1. CobaltStrike证书修改躲避流量审查
  2. CS 合法证书 + Powershell 上线
  3. Cobalt Strike 团队服务器隐匿

5. CobaltStrike分析参考

  1. Volatility Plugin for Detecting Cobalt Strike Beacon. blog|Toolset
  2. 逆向分析Cobalt Strike安装后门
  3. 分析cobaltstrike c2 协议
  4. Small tool to decrypt a Cobalt Strike auth file

0x02 C2 Profiles

TypeNameDescriptionPopularityLanguage
ALLMalleable-C2-ProfilesOfficial Malleable C2 Profiles1049983-20201118154726206-1303728779.png1049983-20201118154726717-605678015.png
ALLMalleable-C2-RandomizerThis script randomizes Cobalt Strike Malleable C2 profiles through the use of a metalanguage1049983-20201118154727036-1758740522.png1049983-20201118154727340-1953060075.png
ALLmalleable-c2Cobalt Strike Malleable C2 Design and Reference Guide1049983-20201118154727632-2103361317.png1049983-20201118154727907-224113785.png
ALLC2concealerC2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.1049983-20201118154728228-1748891378.png1049983-20201118154728526-360276567.png


0x03 BOF

TypeNameDescriptionPopularityLanguage
ALLBOF_CollectionVarious Cobalt Strike BOFs1049983-20201118154728826-1471421353.png1049983-20201118154729125-837460255.png
ALLSituational Awareness BOFIts larger goal is providing a code example and workflow for others to begin making more BOF files. Blog1049983-20201118154729455-851251846.png1049983-20201118154729794-983036394.png
ALLQueueUserAPC_PPIDBOF spawns a process of your choice under a specified parent, and injects a provided shellcode file via QueueUserAPC().1049983-20201118154730090-273539676.png1049983-20201118154730371-1210276285.png
ALLbof_helperBeacon Object File (BOF) Creation Helper1049983-20201118154730661-1621482485.png1049983-20201118154730966-1623060092.png


0x04 Aggressor Script

TypeNameDescriptionPopularityLanguage
BypassAVBypassAV用于快速生成免杀的可执行文件1049983-20201118154731282-1589671205.png1049983-20201118154731649-39111337.png
BypassAVscrunBypassAV ShellCode Loader (Cobaltstrike/Metasploit) Useage1049983-20201118154731936-2034928602.png1049983-20201118154732245-2104938290.png
BypassAVbeacon-c2-gobeacon-c2-go (Cobaltstrike/Metasploit)1049983-20201118154732550-640497144.png1049983-20201118154732897-2094711065.png
BypassAVC--Shellcodepython ShellCode Loader (Cobaltstrike&Metasploit) Useage1049983-20201118154733195-640742355.png1049983-20201118154733596-1462741666.png
Reconred-team-scriptsperform some rudimentary Windows host enumeration with Beacon built-in commands1049983-20201118154733897-879456268.png1049983-20201118154734214-1287776916.png
Reconaggressor-powerviewAll functions listed in the PowerView about page are included in this with all arguments for each function. PowerView1049983-20201118154734501-1289283649.png1049983-20201118154734780-346345869.png
ReconPowerView3-AggressorPowerView Aggressor Script for CobaltStrike PowerView1049983-20201118154735172-633100083.png1049983-20201118154735488-378026988.png
ReconAggressorScriptsSharphound-Aggressor- A user menu for the SharpHound ingestor1049983-20201118154735799-1182151431.png1049983-20201118154736119-798022820.png
ReconServerScan内网横向信息收集的高并发网络扫描、服务探测工具。1049983-20201118154736463-824206237.png1049983-20201118154736757-778911550.png
ExploitXSS-Fishing2-CS鱼儿在cs上线后自动收杆 / Automatically stop fishing in javascript after the fish is hooked1049983-20201118154737080-1053115680.png1049983-20201118154737431-138426057.png
ExploitXSS-Phishingxss钓鱼,cna插件配合php后端收杆1049983-20201118154737813-749244275.png1049983-20201118154738094-1356283617.png
Exploitcustom_payload_generatorCobaltStrike3.0+ --> creates various payloads for Cobalt Strike's Beacon. Current payload formats1049983-20201118154738403-278982550.png1049983-20201118154738685-383672080.png
ExploitCrossC2CrossC2 framework - Generator CobaltStrike's cross-platform beacon1049983-20201118154739027-1353473457.png1049983-20201118154739577-2033133216.png
ExploitGECCGo External C2 Client implementation for cobalt strike.1049983-20201118154739873-464594517.png1049983-20201118154740173-290571483.png
ExploitCobaltstrike-MS17-010ms17-010 exploit tool and scanner.1049983-20201118154740462-1814332155.png1049983-20201118154740779-1545283338.png
ExploitAES-PowerShellCodeStandalone version of my AES Powershell payload for Cobalt Strike.1049983-20201118154741092-359613737.png1049983-20201118154741410-192596467.png
ExploitSweetPotato_CSCobaltStrike4.x --> SweetPotato1049983-20201118154741728-2031799164.png1049983-20201118154742013-543855985.png
ExploitElevateKitprivilege escalation exploits1049983-20201118154742329-115342207.png1049983-20201118154742725-455687712.png
ExploitCVE-2018-4878CVE-2018-48781049983-20201118154743027-1142619219.png1049983-20201118154743345-183273396.png
ExploitAggressor-ScriptsThe only current public is UACBypass, whose readme can be found inside its associated folder.1049983-20201118154743645-1285288571.png1049983-20201118154743944-2135915239.png
ExploitCVE_2020_0796_CNA基于ReflectiveDLLInjection实现的本地提权漏洞1049983-20201118154744259-1862936357.png1049983-20201118154744605-198514391.png
ExploitDDEAutoCSsetup our stage(d) Web Delivery attack1049983-20201118154744909-1400634138.png1049983-20201118154745207-118463794.png
ExploitgeaconImplement CobaltStrike's Beacon in Go (can be used in Linux)1049983-20201118154745526-1316458086.png1049983-20201118154745818-1392456049.png
Persistencepersistence-aggressor-scriptpersistence-aggressor-script1049983-20201118154746134-330726038.png1049983-20201118154746450-544563295.png
PersistencePeinject_dll弃用winexec函数,使用shellexecute函数,程序流不在卡顿,达到真正的无感。1049983-20201118154746738-1234514153.png1049983-20201118154747024-836586568.png
PersistenceTikiTorchTikiTorch follows the same concept(CACTUSTORCH) but has multiple types of process injection available, which can be specified by the user at compile time.1049983-20201118154747351-1190401078.png1049983-20201118154747641-511093313.png
PersistenceCACTUSTORCHA JavaScript and VBScript shellcode launcher. This will spawn a 32 bit version of the binary specified and inject shellcode into it.1049983-20201118154747947-1608816260.png1049983-20201118154748249-1320742868.png
PersistenceUploadAndRunFrp上传frpc并且运行frpc1049983-20201118154748574-2095046971.png1049983-20201118154748899-378125550.png
Persistencepersistence-aggressor-scriptPersistence Aggressor Script1049983-20201118154749258-576509770.png1049983-20201118154749548-1046716049.png
AuxiliaryCobaltstrike-atexec利用任务计划进行横向,需要与135端口、445端口进行通信1049983-20201118154749870-1236592404.png1049983-20201118154750206-1401548023.png
AuxiliarySharpCompileSharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime.1049983-20201118154750512-310134025.png1049983-20201118154750818-468672082.png
AuxiliaryQuickrundownUtilizing QRD will allow an operator to quickly characterize what processes are both known and unknown on a host through the use of colors and notes about the processes displayed.1049983-20201118154751121-150951709.png1049983-20201118154751430-221387164.png
AuxiliaryPhant0m_cobaltstrikeThis script walks thread stacks of Event Log Service process (spesific svchost.exe) and identify Event Log Threads to kill Event Log Service Threads. So the system will not be able to collect logs and at the same time the Event Log Service will appear to be running.1049983-20201118154751735-439396642.png1049983-20201118154752126-762866817.png
AuxiliaryNoPowerShellNoPowerShell is a tool implemented in C# which supports executing PowerShell-like commands while remaining invisible to any PowerShell logging mechanisms.1049983-20201118154752459-1910972234.png1049983-20201118154752802-460375657.png
AuxiliaryEventLogMasterRDP EventLog Master1049983-20201118154753101-47129047.png1049983-20201118154753408-265009891.png
AuxiliaryANGRYPUPPYBloodhound Attack Path Execution for Cobalt Strike1049983-20201118154753748-1437194902.png1049983-20201118154754063-2085246249.png
AuxiliaryCobaltStrike_Script_Wechat_Push上线微信提醒的插件,通过微信Server酱提醒1049983-20201118154754372-261193728.png1049983-20201118154754669-1696455276.png
AuxiliaryCS-Aggressor-Scriptsslack and webhooks reminder1049983-20201118154754976-1730663951.png1049983-20201118154755272-1628539455.png
AuxiliaryAggressor-Scriptssurveying of powershell on targets (在对应的目标上检测powershell的相关信息)1049983-20201118154755577-1130765863.png1049983-20201118154755883-1651846108.png
Auxiliarycs-magikImplements an events channel and job queue using Redis for Cobalt Strike.1049983-20201118154756222-817445559.png1049983-20201118154756527-1751613886.png
AuxiliaryAggressorScripts查看进程的时候讲av进程标注为红色1049983-20201118154756859-1113491250.png1049983-20201118154757161-339823710.png
AuxiliaryRavenCobaltStrike External C2 for Websockets1049983-20201118154757476-425236154.png1049983-20201118154757780-1957023741.png
AuxiliaryCobaltStrikeParserPython parser for CobaltStrike Beacon's configuration1049983-20201118154758157-666199199.png1049983-20201118154758540-88086291.png
AuxiliaryfakelogonscreenFakeLogonScreen is a utility to fake the Windows logon screen in order to obtain the user's password.1049983-20201118154758848-998806176.png1049983-20201118154759155-1974484683.png
AuxiliarySyncDogMake bloodhound sync with cobaltstrike.1049983-20201118154759450-350330896.png1049983-20201118154759771-818656748.png
SynthesisErebusCobaltStrike4.x --> Erebus CobaltStrike后渗透测试插件1049983-20201118154800067-1768461295.png1049983-20201118154800336-926182781.png
SynthesisCobalt-Strike-Aggressor-ScriptsCobaltStrike后渗透测试插件集合 Usage1049983-20201118154800625-166596323.png1049983-20201118154800918-2141787456.png
SynthesisAggressorScriptsAggressor scripts for use with Cobalt Strike 3.0+1049983-20201118154801212-189981613.png1049983-20201118154801538-2044669735.png
SynthesisRedTeamToolsRedTeamTools for use with Cobalt Strike1049983-20201118154801853-796484686.png1049983-20201118154802142-210828003.png
Synthesiscobalt-arsenalAggressor Scripts for Cobalt Strike 4.0+1049983-20201118154802470-1867955448.png1049983-20201118154802800-913616625.png
SynthesisMoveKitThe aggressor script handles payload creation by reading the template files for a specific execution type. intro1049983-20201118154803090-1469542459.png1049983-20201118154803393-1095536619.png
SynthesisStayKitThe aggressor script handles payload creation by reading the template files for a specific execution type. intro1049983-20201118154803727-1418105004.png1049983-20201118154804051-516961730.png
SynthesisAggressorScriptsAggressorScripts1049983-20201118154804339-1523760772.png1049983-20201118154804660-1217747117.png
SynthesisAggressorScriptsCollection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources1049983-20201118154804943-1015913162.png1049983-20201118154805248-1765223659.png
SynthesisAggressorScriptsAggressorScripts1049983-20201118154805574-2017119712.png1049983-20201118154805863-575849717.png
SynthesisAggressor-VYSECContains a bunch of CobaltStrike Aggressor Scripts1049983-20201118154806163-165010961.png1049983-20201118154806528-888348356.png
SynthesisAggressorAssessorAggressorAssessor1049983-20201118154806882-664849219.png1049983-20201118154807196-430706507.png
SynthesisAggressorAssessorAggressorAssessor1049983-20201118154807494-2122471736.png1049983-20201118154807806-751860731.png
Synthesisaggressor-scriptsCollection of Cobalt Strike Aggressor Scripts1049983-20201118154808127-485304973.png1049983-20201118154808591-426868026.png
SynthesisAggressor-scriptsThis is just a random collection of Aggressor Scripts I've written for Cobalt Strike 3.x. (其中有一个debug脚本比较好用)1049983-20201118154809012-381843489.png1049983-20201118154809314-1577773322.png
SynthesisAggressor-ScriptCollection of Aggressor Scripts for Cobalt Strike(主要包含了提权和权限维持脚本)1049983-20201118154809639-283805483.png1049983-20201118154809939-1211165876.png
SynthesisAggressor-ScriptAggressor Script, Kit, Malleable C2 Profiles, External C2 and so on1049983-20201118154810258-1350675074.png1049983-20201118154810646-1735740801.png
Synthesisaggressor_scripts_collectionCollection of various aggressor scripts for Cobalt Strike from awesome people. Will be sure to update this repo with credit to each person.1049983-20201118154810956-299908783.png1049983-20201118154811275-1327344427.png
SynthesisCobaltStrike-ToolKitgooglesearch.profile and script related to AD.1049983-20201118154811596-1649827405.png1049983-20201118154811938-499305728.png
SynthesisArsenalCobalt Strike 3.13 Arsenal Kit1049983-20201118154812243-1207358389.png1049983-20201118154812581-36221453.png
Synthesiscobalt-arsenalMy collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+1049983-20201118154812896-1352535303.png1049983-20201118154813191-1639584646.png
Synthesisaggressor_scriptscode execution via DCOM;the privilege escalation techniques included in ElevateKit;etc.1049983-20201118154813493-1832407225.png1049983-20201118154813795-1107573824.png
Synthesisaggressor_scriptscode execution via DCOM;the privilege escalation techniques included in ElevateKit;etc.1049983-20201118154814174-1494900826.png1049983-20201118154814519-1805792910.png
Synthesisaggressorcreating tunnels with netsh; changed default to bit.ly redirect to mcdonalds;using powershell to kill parent process;1049983-20201118154814860-2099328373.png1049983-20201118154815155-969148813.png
SynthesisCobaltStrikeCNAA collection of scripts - from various sources - see script for more info.1049983-20201118154815498-123203313.png1049983-20201118154815775-1063437843.png
SynthesisAggressorScriptsHighlights selected processes from the ps command in beacon;Loads various aliases into beacon;sets a few defaults for scripts to be used later..1049983-20201118154816047-1504596546.png1049983-20201118154816357-2124316049.png
SynthesisAggressorAssessor从C2生成到横向移动的全辅助脚本套件1049983-20201118154816660-935519751.png1049983-20201118154816965-842323968.png
SynthesisAggressorCollectionCollection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors1049983-20201118154817273-947519053.png1049983-20201118154817551-230351734.png
SynthesisCobaltstrike-Aggressor-Scripts-CollectionThe collection of tested cobaltstrike aggressor scripts.1049983-20201118154817862-1532885236.png1049983-20201118154818164-906506960.png
SynthesisaggressorScriptsCobaltStrike AggressorScripts for the lazy1049983-20201118154818465-1464094538.png1049983-20201118154818742-896236094.png
Synthesiscobalt_strike_extension_kit集成了SharpHound,SharpRDP,SharpWMI等在内的各种内网工具,使用AggressorScripts构建workflow1049983-20201118154819061-516534482.png1049983-20201118154819367-1088493132.png


0x05 Related Tools

TypeNameDescriptionPopularityLanguage
AntiCScobaltstrike_bruteCobalt Strike Team Server Password Brute Forcer1049983-20201118154819717-1378939472.png1049983-20201118154820017-439141088.png
AuxiliaryredshellAn interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server.1049983-20201118154820302-1551227060.png1049983-20201118154820628-818008370.png
AuxiliaryAnsible-Cobalt-StrikeAn Ansible role to install cobalt-strike on debian based architectures, let's be honest it's for kali.1049983-20201118154820928-2145335255.png1049983-20201118154821231-126241300.png
SynthesisrediAutomated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)1049983-20201118154821540-2026285558.png1049983-20201118154821829-1497806723.png
Synthesiscs2modrewriteAutomatically Generate Rulesets for Apache mod_rewrite or Nginx for Intelligent HTTP C2 Redirection1049983-20201118154822112-1994987562.png1049983-20201118154822432-857869620.png
SynthesisRed-EC2Deploy RedTeam Specific EC2 via ansible.)1049983-20201118154822745-1506494857.png1049983-20201118154823041-79948554.png


0x06 Source Code

TypeNameDescription
Sourcecobalt-strike-sourceCobalt Strike 3.12 Source Code (Decompiled and Fixed)






创建帐户或登录后发表意见

最近浏览 0

  • 没有会员查看此页面。