Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/zer0yu/Awesome-CobaltStrike
List of Awesome CobaltStrike Resources
https://github.com/zer0yu/Awesome-CobaltStrike
List: Awesome-CobaltStrike
cobalt-strike redteam security
Last synced: about 1 month ago
JSON representation
List of Awesome CobaltStrike Resources
- Host: GitHub
- URL: https://github.com/zer0yu/Awesome-CobaltStrike
- Owner: zer0yu
- Created: 2020-08-15T09:10:13.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2023-09-20T12:55:32.000Z (about 1 year ago)
- Last Synced: 2024-05-22T04:15:17.649Z (7 months ago)
- Topics: cobalt-strike, redteam, security
- Homepage: https://github.com/zer0yu/Awesome-CobaltStrike
- Size: 252 KB
- Stars: 3,836
- Watchers: 102
- Forks: 714
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - zer0yu/Awesome-CobaltStrike - List of Awesome CobaltStrike Resources (Others)
README
# Awesome CobaltStrike ![Awesome CobaltStrike](https://img.shields.io/badge/awesome-cobaltstrike-red.svg) ![Awesome community](https://img.shields.io/badge/awesome-community-green.svg)
### Contents
- [0x00 Introduction](#0x00-introduction)
- [0x01 Articles & Videos](#0x01-articles--videos)
- [1. Basic Knowledge](#1-basic-knowledge)
- [2. Crack and Customisation](#2-crack-and-customisation)
- [3. Useful Trick](#3-useful-trick)
- [4. CobaltStrike Hide](#4-cobaltstrike-hide)
- [5. CobaltStrike Analysis](#5-cobaltstrike-analysis)
- [6. CobaltStrike Video](#6-cobaltstrike-video)
- [0x02 C2 Profiles](#0x02-c2-profiles)
- [0x03 BOF](#0x03-bof)
- [0x04 Aggressor Script](#0x04-aggressor-script)
- [0x05 Related Tools](#0x05-related-tools)
- [0x06 Related Resources](#0x06-related-resources)### 0x00 Introduction
1. The first part is a collection of quality articles about CobaltStrike
2. The third part is about the integration of the new features BOF resources
3. This project is to solve the problem of not finding the right aggressor script or BOF when it is needed
4. If there is quality content that is not covered in this repo, welcome to submit pr### 0x01 Articles & Videos
#### 1. Basic Knowledge
1. [Cobalt_Strike_wiki](https://github.com/aleenzz/Cobalt_Strike_wiki)
2. [Cobalt Strike Book](https://wbglil.gitbook.io/cobalt-strike/)
3. [CobaltStrike4.0笔记](https://github.com/Snowming04/CobaltStrike4.0_related)
4. [CobaltStrike相关网络文章集合](https://4hou.win/wordpress/?cat=306)
5. [Cobalt Strike 外部 C2 之原理篇](http://blog.leanote.com/post/snowming/50448511de58)
6. [Cobalt Strike 桌面控制问题的解决(以及屏幕截图等后渗透工具)](http://blog.leanote.com/post/snowming/32fabf2deae1)
7. [Cobalt Strike & MetaSploit 联动](http://blog.leanote.com/post/snowming/43cef4b64cbd)
8. [Cobalt-Strike-CheatSheet](https://github.com/S1ckB0y1337/Cobalt-Strike-CheatSheet)
9. [Cobalt Strike MITRE TTPs](https://github.com/MichaelKoczwara/Awesome-CobaltStrike-Defence)
10. [Red Team Operations with Cobalt Strike (2019)](https://github.com/martabyte/Red-Team-Ops/blob/main/Red-Team-Ops.md)
11. [Cobalt Strike: Overview](https://blog.nviso.eu/2022/03/22/cobalt-strike-overview-part-7/)
12. [CobaltStrike插件开发](https://t.zsxq.com/04RfYVNzb)
13. [Cobalt Strike 中文 Wiki](https://github.com/XXC385/Cobalt-Strike-Start)#### 2. Crack and Customisation
1. [IntelliJ-IDEA修改cobaltstrike](https://pingmaoer.github.io/2020/06/08/IntelliJ-IDEA修改cobaltstrike/)
2. [CobaltStrike二次开发环境准备](https://pingmaoer.github.io/2020/06/24/CobaltStrike二次开发环境准备/)
3. [Cobal Strike 自定义OneLiner](https://evi1cg.me/archives/Custom_Oneliner.html)
4. [通过反射DLL注入来构建后渗透模块(第一课)](https://payloads.online/archivers/2020-03-02/1)
5. [Cobalt Strike Aggressor Script (第一课)](https://payloads.online/archivers/2020-03-02/4)
6. [Cobalt Strike Aggressor Script (第二课)](https://payloads.online/archivers/2020-03-02/5)
7. [Implementing Syscalls In The Cobaltstrike Artifact Kit](https://br-sn.github.io/Implementing-Syscalls-In-The-CobaltStrike-Artifact-Kit/)
8. [Cobalt Strike 4.0 认证及修补过程](https://xz.aliyun.com/t/8557)
9. [使用ReflectiveDLLInjection武装你的CobaltStrike](https://mp.weixin.qq.com/s/-Inh6uWV9YCz0zQYfitceA)
10. [Bypass cobaltstrike beacon config scan](https://mp.weixin.qq.com/s/fhcTTWV4Ddz4h9KxHVRcnw)
11. [Tailoring Cobalt Strike on Target](https://blog.xpnsec.com/tailoring-cobalt-strike-on-target/)
12. [COFFLOADER: BUILDING YOUR OWN IN MEMORY LOADER OR HOW TO RUN BOFS](https://www.trustedsec.com/blog/coffloader-building-your-own-in-memory-loader-or-how-to-run-bofs/)
13. [Yet Another Cobalt Strike Stager: GUID Edition](https://www.guidepointsecurity.com/yet-another-cobalt-strike-loader-guid-edition/)
14. [Cobalt Strike4.3 破解日记](https://blog.pr0ph3t.com/posts/Cobalt-Strike4.3%E7%A0%B4%E8%A7%A3%E6%97%A5%E8%AE%B0/)
15. [Cobalt Strike 进程创建与对应的 Syslog 日志分析](https://hausec.com/2021/07/26/cobalt-strike-and-tradecraft/)
16. [Behind the Mask: Spoofing Call Stacks Dynamically with Timers](https://www.cobaltstrike.com/blog/behind-the-mask-spoofing-call-stacks-dynamically-with-timers/)#### 3. Useful Trick
1. [Cobalt Strike Spear Phish](https://evi1cg.me/archives/spear_phish.html)
2. [run CS in win -- teamserver.bat](https://evi1cg.me/archives/teamserver.html)
3. [Remote NTLM relaying through CS -- related to CVE_2018_8581](https://evi1cg.me/archives/Remote_NTLM_relaying_through_CS.html)
4. [Cobalt Strike Convet VPN](http://blog.leanote.com/post/snowming/82b418239c13)
5. [渗透神器CS3.14搭建使用及流量分析](https://mp.weixin.qq.com/s/DG87HFrwHf25_M2Dnfdx3g)
6. [CobaltStrike生成免杀shellcode](https://mp.weixin.qq.com/s/G1hmsDVTO2208Ymlia_ggQ)
7. [CS-notes](https://github.com/kluo84/CS-notes)--一系列CS的使用技巧笔记
8. [使用 Cobalt Strike 对 Linux 主机进行后渗透](http://blog.leanote.com/post/snowming/c34f9defe00c)
9. [Cobalt Strike Listener with Proxy](http://blog.leanote.com/post/snowming/2ec80f7823e0)
10. [Cobalt Strike Convet VPN](http://blog.leanote.com/post/snowming/82b418239c13)
11. [CS 4.0 SMB Beacon](http://blog.leanote.com/post/snowming/8b7ce0f84c03)
12. [Cobalt Strike 浏览器跳板攻击](http://blog.leanote.com/post/snowming/4e07af1cab60)
13. [Cobalt Strike 中 Bypass UAC](http://blog.leanote.com/post/snowming/b6f671477095)
14. [一起探索Cobalt Strike的ExternalC2框架](https://www.anquanke.com/post/id/103395/)
15. [深入探索Cobalt Strike的ExternalC2框架](https://xz.aliyun.com/t/2239)
16. [Cobalt Strike的特殊功能(external_C2)探究](https://www.anquanke.com/post/id/86980/)
17. [A tale of .NET assemblies, cobalt strike size constraints, and reflection](https://redteamer.tips/a-tale-of-net-assemblies-cobalt-strike-size-constraints-and-reflection/)
18. [AppDomain.AssemblyResolve](https://offensivedefence.co.uk/posts/assembly-resolve/)
19. [从webshell建立代理上线不出网的内网机器](https://mp.weixin.qq.com/s/mNCROss5pa4rkrWIIfjVfQ)
20. [在Cobalt Strike BOF中进行直接系统调用](https://mp.weixin.qq.com/s/TLyQOupzep1BN7_nbjCXeQ)
21. [Using Direct Syscalls in Cobalt Strike's Artifact Kit](https://www.youtube.com/watch?v=mZyMs2PP38w&feature=youtu.be&ab_channel=RaphaelMudge)
22. [Cobalt Strike Staging and Extracting Configuration Information](https://blog.securehat.co.uk/cobaltstrike/extracting-config-from-cobaltstrike-stager-shellcode)
23. [Create a proxy DLL with artifact kit](https://www.cobaltstrike.com/blog/create-a-proxy-dll-with-artifact-kit/)
24. [Attackers are abusing MSBuild to evade defenses and implant Cobalt Strike beacons](https://isc.sans.edu/forums/diary/Attackers+are+abusing+MSBuild+to+evade+defenses+and+implant+Cobalt+Strike+beacons/28180/#comments)
25. [Lateral Movement with LiquidSnake](https://tw1sm.github.io/2021-09-13-liquidsnake/)
26. [CoffLoader from OtterHacker](https://otterhacker.github.io/Malware/CoffLoader.html#introduction)#### 4. CobaltStrike Hide
1. [CobaltStrike证书修改躲避流量审查](https://mp.weixin.qq.com/s/sYfvD0XQqi6BFw70_jrv5Q)
2. [CS 合法证书 + Powershell 上线](http://blog.leanote.com/post/snowming/6a724671de78)
3. [Cobalt Strike 团队服务器隐匿](http://blog.leanote.com/post/snowming/d5d2b4ba20d0)
4. [红队基础建设:隐藏你的C2 server](https://xz.aliyun.com/t/4509)
5. [Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite](https://bluescreenofjeff.com/2016-06-28-cobalt-strike-http-c2-redirectors-with-apache-mod_rewrite/)
6. [深入研究cobalt strike malleable C2配置文件](https://xz.aliyun.com/t/2796)
7. [A Brave New World: Malleable C2](http://www.harmj0y.net/blog/redteaming/a-brave-new-world-malleable-c2/)
8. [How to Write Malleable C2 Profiles for Cobalt Strike](https://bluescreenofjeff.com/2017-01-24-how-to-write-malleable-c2-profiles-for-cobalt-strike/)
9. [Randomized Malleable C2 Profiles Made Easy](https://bluescreenofjeff.com/2017-08-30-randomized-malleable-c2-profiles-made-easy/)
10. [关于CobaltStrike的Stager被扫问题](https://mp.weixin.qq.com/s/0MPM3bysJJYr5jbRnES_Vg)
11. [Beacon Stager listener 去特征](https://mp.weixin.qq.com/s/HibtLfikI_0ezcLVCRxqaA)
12. [检测与隐藏Cobaltstrike服务器](https://hosch3n.github.io/2020/12/16/%E6%A3%80%E6%B5%8B%E4%B8%8E%E9%9A%90%E8%97%8FCobaltstrike%E6%9C%8D%E5%8A%A1%E5%99%A8/)
13. [记一次cs bypass卡巴斯基内存查杀](https://xz.aliyun.com/t/9224)
14. [cs bypass卡巴斯基内存查杀 2](https://xz.aliyun.com/t/9399)
15. [Cobalt Strike – Bypassing C2 Network Detections](https://newtonpaul.com/cobalt-strike-bypassing-c2-network-detections/)
16. [Cobalt Strike特征隐藏](https://www.cnblogs.com/Xy--1/p/14396744.html)
17. [Cobalt Strike 反溯源之 CDN 篇](https://mp.weixin.qq.com/s/9taI6KQzKy2vcKHJXnwgmg)
18. [Unleashing The Unseen: Harnessing The Power Of Cobalt Strike Profiles For EDR Evasion](https://whiteknightlabs.com/2023/05/23/unleashing-the-unseen-harnessing-the-power-of-cobalt-strike-profiles-for-edr-evasion/)#### 5. CobaltStrike Analysis
1. Volatility Plugin for Detecting Cobalt Strike Beacon. [blog](https://blogs.jpcert.or.jp/en/2018/08/volatility-plugin-for-detecting-cobalt-strike-beacon.html)|[Toolset](https://github.com/RomanEmelyanov/CobaltStrikeForensic)
2. [逆向分析Cobalt Strike安装后门](https://mp.weixin.qq.com/s/VHpcHzLc829hmQjrx1139A)
3. [分析cobaltstrike c2 协议](https://github.com/verctor/Cobalt_Homework)
4. Small [tool](https://github.com/Mkv4/cobaltstrike-authfile-decrypt) to decrypt a Cobalt Strike auth file
5. [Cobalt Strike 的 ExternalC2](https://xz.aliyun.com/t/6565)
6. [Detecting Cobalt Strike Default Modules via Named Pipe Analysis](https://labs.f-secure.com/blog/detecting-cobalt-strike-default-modules-via-named-pipe-analysis/)
7. [浅析CobaltStrike Beacon Staging Server扫描](https://mp.weixin.qq.com/s/WUf96myUi8F3X_eNWPRTdw)
8. [Striking Back at Retired Cobalt Strike: A look at a legacy vulnerability](https://research.nccgroup.com/2020/06/15/striking-back-at-retired-cobalt-strike-a-look-at-a-legacy-vulnerability/)
9. [Analyzing Cobalt Strike for Fun and Profit](https://www.randhome.io/blog/2020/12/20/analyzing-cobalt-strike-for-fun-and-profit/)
10. [Cobalt Strike Remote Threads detection](https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f)
11. [The art and science of detecting Cobalt Strike](https://talos-intelligence-site.s3.amazonaws.com/production/document_files/files/000/095/031/original/Talos_Cobalt_Strike.pdf)
12. [A Multi-Method Approach to Identifying Rogue Cobalt Strike Servers](https://go.recordedfuture.com/hubfs/reports/cta-2019-0618.pdf)
13. [How to detect Cobalt Strike activities in memory forensics](https://www.andreafortuna.org/2020/11/22/how-to-detect-cobalt-strike-activity-in-memory-forensics/)
14. [Detecting Cobalt Strike by Fingerprinting Imageload Events](https://redhead0ntherun.medium.com/detecting-cobalt-strike-by-fingerprinting-imageload-events-6c932185d67c)
15. [The Anatomy of an APT Attack and CobaltStrike Beacon’s Encoded Configuration](https://labs.sentinelone.com/the-anatomy-of-an-apt-attack-and-cobaltstrike-beacons-encoded-configuration/)
16. [CobaltStrike - beacon.dll : Your No Ordinary MZ Header](https://tccontre.blogspot.com/2019/11/cobaltstrike-beacondll-your-not.html)
17. [GitHub-hosted malware calculates Cobalt Strike payload from Imgur pic](https://www.bleepingcomputer.com/news/security/github-hosted-malware-calculates-cobalt-strike-payload-from-imgur-pic/)
18. [Detecting Cobalt Strike beacons in NetFlow data](https://delaat.net/rp/2019-2020/p29/report.pdf)
19. [Volatility Plugin for Detecting Cobalt Strike Beacon](https://blogs.jpcert.or.jp/en/2018/08/volatility-plugin-for-detecting-cobalt-strike-beacon.html)
20. [Easily Identify Malicious Servers on the Internet with JARM](https://engineering.salesforce.com/easily-identify-malicious-servers-on-the-internet-with-jarm-e095edac525a)
21. [Cobalt Strike Beacon Analysis](https://isc.sans.edu/forums/diary/Quick+Tip+Cobalt+Strike+Beacon+Analysis/26818/)
22. [Hancitor infection with Pony, Evil Pony, Ursnif, and Cobalt Strike](https://isc.sans.edu/forums/diary/Hancitor+infection+with+Pony+Evil+Pony+Ursnif+and+Cobalt+Strike/25532/)
23. [Attackers Exploiting WebLogic Servers via CVE-2020-14882 to install Cobalt Strike](https://isc.sans.edu/forums/diary/Attackers+Exploiting+WebLogic+Servers+via+CVE202014882+to+install+Cobalt+Strike/26752/)
24. [Hiding in the Cloud: Cobalt Strike Beacon C2 using Amazon APIs](https://rhinosecuritylabs.com/aws/hiding-cloudcobalt-strike-beacon-c2-using-amazon-apis/)
25. [Identifying Cobalt Strike team servers in the wild](https://blog.fox-it.com/2019/02/26/identifying-cobalt-strike-team-servers-in-the-wild/)
26. [Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature](https://blog.malwarebytes.com/threat-analysis/2020/06/multi-stage-apt-attack-drops-cobalt-strike-using-malleable-c2-feature/)
27. [Operation Cobalt Kitty](http://cdn2.hubspot.net/hubfs/3354902/Cybereason%20Labs%20Analysis%20Operation%20Cobalt%20Kitty.pdf)
28. [Detecting and Advancing In-Memory .NET Tradecraft](https://www.mdsec.co.uk/2020/06/detecting-and-advancing-in-memory-net-tradecraft/)
29. [Analysing Fileless Malware: Cobalt Strike Beacon](https://newtonpaul.com/analysing-fileless-malware-cobalt-strike-beacon/)
30. [IndigoDrop spreads via military-themed lures to deliver Cobalt Strike](https://blog.talosintelligence.com/2020/06/indigodrop-maldocs-cobalt-strike.html)
31. [Cobalt Group Returns To Kazakhstan](https://research.checkpoint.com/2019/cobalt-group-returns-to-kazakhstan/)
32. [Striking Back at Retired Cobalt Strike: A look at a legacy vulnerability](https://research.nccgroup.com/2020/06/15/striking-back-at-retired-cobalt-strike-a-look-at-a-legacy-vulnerability/)
33. [Azure Sentinel Quick-Deploy with Cyb3rWard0g’s Sentinel To-Go – Let’s Catch Cobalt Strike!](https://www.blackhillsinfosec.com/azure-sentinel-quick-deploy-with-cyb3rward0gs-sentinel-to-go-lets-catch-cobalt-strike/)
34. [Cobalt Strike stagers used by FIN6](https://malwarelab.eu/posts/fin6-cobalt-strike/)
35. [Malleable C2 Profiles and You](https://haggis-m.medium.com/malleable-c2-profiles-and-you-7c7ab43e7929)
36. [C2 Traffic patterns including Cobalt Strike](https://marcoramilli.com/2021/01/09/c2-traffic-patterns-personal-notes/)
37. [Cobalt Strike DNS Direct Egress Not That Far Away](https://dtm.uk/cobalt-strike-dns-direct-egress/)
38. [Detecting Exposed Cobalt Strike DNS Redirectors](https://labs.f-secure.com/blog/detecting-exposed-cobalt-strike-dns-redirectors)
39. [Example of Cleartext Cobalt Strike Traffic](https://isc.sans.edu/forums/diary/Example+of+Cleartext+Cobalt+Strike+Traffic+Thanks+Brad/27300/)
40. [Cobaltstrike-Beacons analyzed](https://zero.bs/cobaltstrike-beacons-analyzed.html)
41. [通过DNS协议探测Cobalt Strike服务器](https://mp.weixin.qq.com/s/peIpPJLt4NuJI1a31S_qbQ)
42. [Detecting Cobalt Strike with memory signatures](https://www.elastic.co/cn/blog/detecting-cobalt-strike-with-memory-signatures)
43. [CobaltStrike通信中host字段的获取](https://zhufan.net/2021/01/05/cobaltstrike%E9%80%9A%E4%BF%A1%E4%B8%ADhost%E5%AD%97%E6%AE%B5%E7%9A%84%E8%8E%B7%E5%8F%96/)
44. [反击CobaltStrike(一) 以假乱真](https://www.anquanke.com/post/id/252332)
45. [某 C2 鸡肋漏洞分析:你的 CS 安全吗?](https://mp.weixin.qq.com/s/SqU7NaFa9du-1r2HX3BJcQ)
46. [Cobalt Strike Beacon Analysis from a Live C2](https://blog.spookysec.net//cs-beacon-analysis/)#### 6. CobaltStrike Video
1. [Malleable Memory Indicators with Cobalt Strike's Beacon Payload](https://www.youtube.com/watch?v=93GyP-mEUAw&feature=emb_title)
2. [STAR Webcast: Spooky RYUKy: The Return of UNC1878](https://www.youtube.com/watch?v=BhjQ6zsCVSc)
3. [Excel 4.0 Macros Analysis - Cobalt Strike Shellcode Injection](https://www.youtube.com/watch?v=XnN_UWfHlNM)
4. [Profiling And Detecting All Things SSL With JA3](https://www.youtube.com/watch?v=oprPu7UIEuk)### 0x02 C2 Profiles
| Type | Name | Description | Popularity | Language |
|:---:|:---:|:---:|:---:|:---:|
| ALL | [Malleable-C2-Profiles](https://github.com/rsmudge/Malleable-C2-Profiles) | Official Malleable C2 Profiles | ![](https://img.shields.io/github/stars/rsmudge/Malleable-C2-Profiles) | ![](https://img.shields.io/github/languages/top/rsmudge/Malleable-C2-Profiles) |
| ALL | [Malleable-C2-Randomizer](https://github.com/bluscreenofjeff/Malleable-C2-Randomizer) | This script randomizes Cobalt Strike Malleable C2 profiles through the use of a metalanguage | ![](https://img.shields.io/github/stars/bluscreenofjeff/Malleable-C2-Randomizer) | ![](https://img.shields.io/github/languages/top/bluscreenofjeff/Malleable-C2-Randomizer)|
| ALL | [malleable-c2](https://github.com/threatexpress/malleable-c2) | Cobalt Strike Malleable C2 Design and Reference Guide | ![](https://img.shields.io/github/stars/threatexpress/malleable-c2) | ![](https://img.shields.io/github/languages/top/threatexpress/malleable-c2) |
| ALL | [Malleable-C2-Profiles](https://github.com/BC-SECURITY/Malleable-C2-Profiles) | A collection of profiles used in Cobalt Strike and Empire's Malleable C2 Listener. | ![](https://img.shields.io/github/stars/BC-SECURITY/Malleable-C2-Profiles) | ![](https://img.shields.io/github/languages/top/BC-SECURITY/Malleable-C2-Profiles) |
| ALL | [random_c2_profile](https://github.com/threatexpress/random_c2_profile) | Random C2 Profile Generator | ![](https://img.shields.io/github/stars/threatexpress/random_c2_profile) | ![](https://img.shields.io/github/languages/top/threatexpress/random_c2_profile) |
| ALL | [SourcePoint](https://github.com/Tylous/SourcePoint) | SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion. | ![](https://img.shields.io/github/stars/Tylous/SourcePoint) | ![](https://img.shields.io/github/languages/top/Tylous/SourcePoint) |
| ALL | [C2concealer](https://github.com/FortyNorthSecurity/C2concealer) | C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike. | ![](https://img.shields.io/github/stars/FortyNorthSecurity/C2concealer) | ![](https://img.shields.io/github/languages/top/FortyNorthSecurity/C2concealer)|
| ALL | [MalleableC2-Profiles](https://github.com/mhaskar/MalleableC2-Profiles) | A collection of Cobalt Strike Malleable C2 profiles. now have Windows Updates Profile | ![](https://img.shields.io/github/stars/mhaskar/MalleableC2-Profiles) | ![](https://img.shields.io/github/languages/top/mhaskar/MalleableC2-Profiles)|
| ALL | [MalleableC2-Profiles](https://github.com/xx0hcd/Malleable-C2-Profiles) | Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike | ![](https://img.shields.io/github/stars/xx0hcd/Malleable-C2-Profiles) | ![](https://img.shields.io/github/languages/top/xx0hcd/Malleable-C2-Profiles)|
| ALL | [pyMalleableC2](https://github.com/Porchetta-Industries/pyMalleableC2) | A Python interpreter for Cobalt Strike Malleable C2 profiles that allows you to parse, modify, build them programmatically and validate syntax. | ![](https://img.shields.io/github/stars/Porchetta-Industries/pyMalleableC2) | ![](https://img.shields.io/github/languages/top/Porchetta-Industries/pyMalleableC2) |
| ALL | [1135-CobaltStrike-ToolKit](https://github.com/1135/1135-CobaltStrike-ToolKit) | Cobalt Strike的Malleable C2配置文件,被设计用来对抗流量分析 | ![](https://img.shields.io/github/stars/1135/1135-CobaltStrike-ToolKit) | ![](https://img.shields.io/github/languages/top/1135/1135-CobaltStrike-ToolKit) |
| ALL | [service_cobaltstrike](https://github.com/wikiZ/service_cobaltstrike) | CobaltStrike profile | ![](https://img.shields.io/github/stars/wikiZ/service_cobaltstrike) | ![](https://img.shields.io/github/languages/top/wikiZ/service_cobaltstrike) |
| ALL | [CobaltNotion](https://github.com/HuskyHacks/CobaltNotion) | A spin-off research project. Cobalt Strike x Notion collab 2022. | ![](https://img.shields.io/github/stars/HuskyHacks/CobaltNotion) | ![](https://img.shields.io/github/languages/top/HuskyHacks/CobaltNotion) |
| ALL | [Burp2Malleable](https://github.com/CodeXTF2/Burp2Malleable) | This is a quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles. | ![](https://img.shields.io/github/stars/CodeXTF2/Burp2Malleable) | ![](https://img.shields.io/github/languages/top/CodeXTF2/Burp2Malleable) |
| ALL | [autoRebind](https://github.com/CrossC2/autoRebind) | Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code | ![](https://img.shields.io/github/stars/CrossC2/autoRebind) | ![](https://img.shields.io/github/languages/top/CrossC2/autoRebind) |
| ALL | [goMalleable](https://github.com/D00Movenok/goMalleable) | Malleable C2 profiles parser and assembler written in golang | ![](https://img.shields.io/github/stars/D00Movenok/goMalleable) | ![](https://img.shields.io/github/languages/top/D00Movenok/goMalleable) |
| ALL | [Malleable-CS-Profiles](https://github.com/WKL-Sec/Malleable-CS-Profiles) | A list of python tools to help create an OPSEC-safe Cobalt Strike profile. | ![](https://img.shields.io/github/stars/WKL-Sec/Malleable-CS-Profiles) | ![](https://img.shields.io/github/languages/top/WKL-Sec/Malleable-CS-Profiles) |### 0x03 BOF
| Type | Name | Description | Popularity | Language |
|:---:|:---:|:---:|:---:|:---:|
| ALL | [BOF_Collection](https://github.com/rvrsh3ll/BOF_Collection) | Various Cobalt Strike BOFs | ![](https://img.shields.io/github/stars/rvrsh3ll/BOF_Collection) | ![](https://img.shields.io/github/languages/top/rvrsh3ll/BOF_Collection) |
| ALL | [cobaltstrike-bof-toolset](https://github.com/AttackTeamFamily/cobaltstrike-bof-toolset) | 收集网络中在cobaltstrike中使用的bof工具集。 | ![](https://img.shields.io/github/stars/AttackTeamFamily/cobaltstrike-bof-toolset) | ![](https://img.shields.io/github/languages/top/AttackTeamFamily/cobaltstrike-bof-toolset) |
| ALL | [Situational Awareness BOF](https://github.com/trustedsec/CS-Situational-Awareness-BOF) | Its larger goal is providing a code example and workflow for others to begin making more BOF files. [Blog](https://www.trustedsec.com/blog/a-developers-introduction-to-beacon-object-files/) | ![](https://img.shields.io/github/stars/trustedsec/CS-Situational-Awareness-BOF) | ![](https://img.shields.io/github/languages/top/trustedsec/CS-Situational-Awareness-BOF) |
| ALL | [bof_helper](https://github.com/dtmsecurity/bof_helper) | Beacon Object File (BOF) Creation Helper | ![](https://img.shields.io/github/stars/dtmsecurity/bof_helper) | ![](https://img.shields.io/github/languages/top/dtmsecurity/bof_helper) |
| ALL | [BOF-DLL-Inject](https://github.com/tomcarver16/BOF-DLL-Inject) | BOF DLL Inject is a custom Beacon Object File that uses manual map DLL injection in order to migrate a dll into a process all from memory. | ![](https://img.shields.io/github/stars/tomcarver16/BOF-DLL-Inject) | ![](https://img.shields.io/github/languages/top/tomcarver16/BOF-DLL-Inject) |
| ALL | [cobaltstrike_bofs](https://github.com/m57/cobaltstrike_bofs) | BOF spawns a process of your choice under a specified parent, and injects a provided shellcode file via QueueUserAPC(). | ![](https://img.shields.io/github/stars/m57/cobaltstrike_bofs) | ![](https://img.shields.io/github/languages/top/m57/cobaltstrike_bofs) |
| ALL | [BOF-RegSave](https://github.com/EncodeGroup/BOF-RegSave) | Beacon Object File(BOF) for CobaltStrike that will acquire the necessary privileges and dump SAM - SYSTEM - SECURITY registry keys for offline parsing and hash extraction. | ![](https://img.shields.io/github/stars/EncodeGroup/BOF-RegSave) | ![](https://img.shields.io/github/languages/top/EncodeGroup/BOF-RegSave) |
| ALL | [CobaltStrike BOF](https://github.com/Yaxser/CobaltStrike-BOF) | DCOM Lateral Movement; WMI Lateral Movement - Win32_Process Create; WMI Lateral Movement - Event Subscription | ![](https://img.shields.io/github/stars/Yaxser/CobaltStrike-BOF) | ![](https://img.shields.io/github/languages/top/Yaxser/CobaltStrike-BOF) |
| ALL | [BOFs](https://github.com/ajpc500/BOFs) | ETW Patching; API Function Utility; Syscalls Shellcode Injection | ![](https://img.shields.io/github/stars/ajpc500/BOFs) | ![](https://img.shields.io/github/languages/top/ajpc500/BOFs) |
| ALL | [Remote Operations BOF](https://github.com/trustedsec/CS-Remote-OPs-BOF) | This repo serves as an addition to our previously released SA Repo. Our original stance was that we would not release our tooling that modified other systems, and we would only provide information gathering tooling in a ready to go format. | ![](https://img.shields.io/github/stars/trustedsec/CS-Remote-OPs-BOF) | ![](https://img.shields.io/github/languages/top/trustedsec/CS-Remote-OPs-BOF) |
| ALL | [OperatorsKit](https://github.com/REDMED-X/OperatorsKit) | This repository contains a collection of tools that integrate with Cobalt Strike through Beacon Object Files (BOFs). | ![](https://img.shields.io/github/stars/REDMED-X/OperatorsKit) | ![](https://img.shields.io/github/languages/top/REDMED-X/OperatorsKit) |
| Dev | [bof](https://github.com/nccgroup/nccfsas/blob/main/Tools/bof-vs-template/README.md) | This is a template project for building Cobalt Strike BOFs in Visual Studio. | ![](https://img.shields.io/github/stars/nccgroup/nccfsas) | ![](https://img.shields.io/github/languages/top/nccgroup/nccfsas) |
| Dev | [Needle_Sift_BOF](https://github.com/EspressoCake/Needle_Sift_BOF) | Strstr with user-supplied needle and filename as a BOF. | ![](https://img.shields.io/github/stars/EspressoCake/Needle_Sift_BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/Needle_Sift_BOF) |
| Dev | [Quser-BOF](https://github.com/netero1010/Quser-BOF) | Beacon Object Files Quser implementation using Windows API | ![](https://img.shields.io/github/stars/netero1010/Quser-BOF) | ![](https://img.shields.io/github/languages/top/netero1010/Quser-BOF) |
| Dev | [BOF.NET](https://github.com/CCob/BOF.NET) | A .NET Runtime for Cobalt Strike's Beacon Object Files. | ![](https://img.shields.io/github/stars/CCob/BOF.NET) | ![](https://img.shields.io/github/languages/top/CCob/BOF.NET) |
| Dev | [beacon-object-file](https://github.com/realoriginal/beacon-object-file) | The format, described by Mudge [here](https://youtube.com/watch?v=gfYswA_Ronw), asks that the operator construct an COFF file using a mingw-w64 compiler or the msvc compiler that holds an symbol name indicating its entrypoint, and underlying function calls. | ![](https://img.shields.io/github/stars/realoriginal/beacon-object-file) | ![](https://img.shields.io/github/languages/top/realoriginal/beacon-object-file) |
| Dev | [InlineWhispers](https://github.com/outflanknl/InlineWhispers) | Demonstrate the ability to easily use syscalls using inline assembly in BOFs. | ![](https://img.shields.io/github/stars/outflanknl/InlineWhispers) | ![](https://img.shields.io/github/languages/top/outflanknl/InlineWhispers) |
| Dev | [WdToggle](https://github.com/outflanknl/WdToggle) | A Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls to enable WDigest credential caching and circumvent Credential Guard (if enabled). | ![](https://img.shields.io/github/stars/outflanknl/WdToggle) | ![](https://img.shields.io/github/languages/top/outflanknl/WdToggle) |
| Dev | [Situational Awareness BOF](https://github.com/trustedsec/CS-Situational-Awareness-BOF) | This Repo intends to serve two purposes. First it provides a nice set of basic situational awareness commands implemented in BOF. This allows you to perform some checks on a host before you begin executing commands that may be more invasive. | ![](https://img.shields.io/github/stars/trustedsec/CS-Situational-Awareness-BOF) | ![](https://img.shields.io/github/languages/top/trustedsec/CS-Situational-Awareness-BOF) |
| Dev | [MiniDumpWriteDump](https://github.com/rookuu/BOFs/tree/main/MiniDumpWriteDump) | Custom implementation of DbgHelp's MiniDumpWriteDump function. Uses static syscalls to replace low-level functions like NtReadVirtualMemory. | ![](https://img.shields.io/github/stars/rookuu/BOFs) | ![](https://img.shields.io/github/languages/top/rookuu/BOFs) |
| Dev | [COFF Loader](https://github.com/trustedsec/COFFLoader) | This is a quick and dirty COFF loader (AKA Beacon Object Files). Currently can run un-modified BOF's so it can be used for testing without a CS agent running it. The only exception is that the injection related beacon compatibility functions are just empty. | ![](https://img.shields.io/github/stars/trustedsec/COFFLoader) | ![](https://img.shields.io/github/languages/top/trustedsec/COFFLoader) |
| Dev | [Self_Deletion_BOF](https://github.com/EspressoCake/Self_Deletion_BOF) | BOF implementation of the research by @jonasLyk and the drafted PoC from @LloydLabs | ![](https://img.shields.io/github/stars/EspressoCake/Self_Deletion_BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/Self_Deletion_BOF) |
| Dev | [PE Import Enumerator BOF](https://github.com/EspressoCake/DLL_Imports_BOF) | This is a BOF to enumerate DLL files to-be-loaded by a given PE file. Depending on the number of arguments, this will allow an operator to either view a listing of anticipated imported DLL files, or to view the imported functions for an anticipated DLL. | ![](https://img.shields.io/github/stars/EspressoCake/DLL_Imports_BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/DLL_Imports_BOF) |
| Dev | [Visual-Studio-BOF-template](https://github.com/securifybv/Visual-Studio-BOF-template) | A Visual Studio template used to create Cobalt Strike BOFs | ![](https://img.shields.io/github/stars/securifybv/Visual-Studio-BOF-template) | ![](https://img.shields.io/github/languages/top/securifybv/Visual-Studio-BOF-template) |
| Dev | [BOF-Builder](https://github.com/ceramicskate0/BOF-Builder) | C# .Net 5.0 project to build BOF (Beacon Object Files) in mass based on them all being in a folder directory struct somewhere. | ![](https://img.shields.io/github/stars/ceramicskate0/BOF-Builder) | ![](https://img.shields.io/github/languages/top/ceramicskate0/BOF-Builder) |
| Dev | [ELFLoader](https://github.com/trustedsec/ELFLoader) | This is a ELF object in memory loader/runner. The goal is to create a single elf loader that can be used to run follow on capabilities across all x86_64 and x86 nix operating systems. | ![](https://img.shields.io/github/stars/trustedsec/ELFLoader) | ![](https://img.shields.io/github/languages/top/trustedsec/ELFLoader) |
| Dev | [Rust BOFs for Cobalt Strike](https://github.com/wumb0/rust_bof) | This took me like 4 days, but I got it working... rust core + alloc for Cobalt Strike BOFs. This is very much a PoC, but I'd love to see others playing around with it and contributing. | ![](https://img.shields.io/github/stars/wumb0/rust_bof) | ![](https://img.shields.io/github/languages/top/wumb0/rust_bof) |
| Dev | [CoffeeLdr](https://github.com/Cracked5pider/CoffeeLdr) | CoffeeLdr is a loader for so called Beacon Object Files. This project can be used for testing Beacon Object files without using the Cobalt Strike framework or can be used to give custom implants a way to execute BOFs that where designed for Cobalt strike. | ![](https://img.shields.io/github/stars/Cracked5pider/CoffeeLdr) | ![](https://img.shields.io/github/languages/top/Cracked5pider/CoffeeLdr) |
| Dev | [HalosGate Processlist Cobalt Strike BOF](https://github.com/boku7/halosgate-ps) | Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes. | ![](https://img.shields.io/github/stars/boku7/halosgate-ps) | ![](https://img.shields.io/github/languages/top/boku7/halosgate-ps) |
| Dev | [PPLFaultDumpBOF](https://github.com/trustedsec/PPLFaultDumpBOF) | Takes the original PPLFault and the original included DumpShellcode and combinds it all into a BOF targeting cobalt strike. | ![](https://img.shields.io/github/stars/trustedsec/PPLFaultDumpBOF) | ![](https://img.shields.io/github/languages/top/trustedsec/PPLFaultDumpBOF) |
| Dev | [Winsocky](https://github.com/WKL-Sec/Winsocky) | Winsocket implementation for Cobalt Strike. Used to communicate with the victim using winsockets instead of the traditional ways. | ![](https://img.shields.io/github/stars/WKL-Sec/Winsocky) | ![](https://img.shields.io/github/languages/top/WKL-Sec/Winsocky) |
| Dev | [bof-vs](https://github.com/Cobalt-Strike/bof-vs) | A Beacon Object File (BOF) template for Visual Studio. | ![](https://img.shields.io/github/stars/Cobalt-Strike/bof-vs) | ![](https://img.shields.io/github/languages/top/Cobalt-Strike/bof-vs) |
| Auxiliary | [Defender Exclusions BOF](https://github.com/EspressoCake/Defender_Exclusions-BOF) | A BOF to determine Windows Defender exclusions. | ![](https://img.shields.io/github/stars/EspressoCake/Defender_Exclusions-BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/Defender_Exclusions-BOF) |
| Auxiliary | [ScreenShot-BOF](https://github.com/qwqdanchun/ScreenShot-BOF) | ScreenShot bof for Cobalt Strike . All in memory and no spawn/inject. | ![](https://img.shields.io/github/stars/qwqdanchun/ScreenShot-BOF) | ![](https://img.shields.io/github/languages/top/qwqdanchun/ScreenShot-BOF) |
| Auxiliary | [BofRoast](https://github.com/cube0x0/BofRoast) | Beacon Object File repo for roasting Active Directory. | ![](https://img.shields.io/github/stars/cube0x0/BofRoast) | ![](https://img.shields.io/github/languages/top/cube0x0/BofRoast) |
| Auxiliary | [EnumCLR.c](https://gist.github.com/G0ldenGunSec/8ca0e853dd5637af2881697f8de6aecc) | Cobalt Strike BOF to identify processes with the CLR loaded with a goal of identifying SpawnTo / injection candidates. | ![](https://img.shields.io/github/stars/G0ldenGunSec) | ![](https://img.shields.io/github/languages/top/G0ldenGunSec) |
| Auxiliary | [PPEnum](https://github.com/rasta-mouse/PPEnum) | Simple BOF to read the protection level of a process. | ![](https://img.shields.io/github/stars/rasta-mouse/PPEnum) | ![](https://img.shields.io/github/languages/top/rasta-mouse/PPEnum) |
| Auxiliary | [secinject](https://github.com/apokryptein/secinject) | Section Mapping Process Injection (secinject): Cobalt Strike BOF | ![](https://img.shields.io/github/stars/apokryptein/secinject) | ![](https://img.shields.io/github/languages/top/apokryptein/secinject)|
| Auxiliary | [FindObjects-BOF](https://github.com/outflanknl/FindObjects-BOF) | A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific modules or process handles. | ![](https://img.shields.io/github/stars/outflanknl/FindObjects-BOF) | ![](https://img.shields.io/github/languages/top/outflanknl/FindObjects-BOF) |
| Auxiliary | [Inject-assembly](https://github.com/kyleavery/inject-assembly) | Inject-assembly - Execute .NET in an Existing Process. This tool is an alternative to traditional fork and run execution for Cobalt Strike. The loader can be injected into any process, including the current Beacon. Long-running assemblies will continue to run and send output back to the Beacon, similar to the behavior of execute-assembly. | ![](https://img.shields.io/github/stars/kyleavery/inject-assembly) | ![](https://img.shields.io/github/languages/top/kyleavery/inject-assembly) |
| Auxiliary | [WhereAmiI](https://github.com/boku7/whereami) | WhereAmiI - Cobalt Strike Beacon Object File (BOF) that uses handwritten shellcode to return the process Environment strings without touching any DLL's. | ![](https://img.shields.io/github/languages/top/kboku7/whereami) |
| Auxiliary | [GetWebDAVStatus](https://github.com/G0ldenGunSec/GetWebDAVStatus) | Small project to determine if the Web Client service (WebDAV) is running on a remote system by checking for the presence of the DAV RPC SERVICE named pipe. | ![](https://img.shields.io/github/stars/G0ldenGunSec/GetWebDAVStatus) | ![](https://img.shields.io/github/languages/top/G0ldenGunSec/GetWebDAVStatus) |
| Auxiliary | [ChromeKeyDump](https://github.com/crypt0p3g/bof-collection/tree/main/ChromeKeyDump) | BOF implementation of Chlonium tool to dump Chrome Masterkey and download Cookie/Login Data files | ![](https://img.shields.io/github/stars/crypt0p3g/bof-collection) | ![](https://img.shields.io/github/languages/top/crypt0p3g/bof-collection) |
| Auxiliary | [Sleeper](https://github.com/crypt0p3g/bof-collection/tree/main/Sleeper) | BOF to call the SetThreadExecutionState function to prevent host from Sleeping | ![](https://img.shields.io/github/stars/crypt0p3g/bof-collection) | ![](https://img.shields.io/github/languages/top/crypt0p3g/bof-collection) |
| Auxiliary | [LSASS](https://github.com/pwn1sher/CS-BOFs/tree/main/lsass) | Beacon Object File to dump Lsass memory by obtaining a snapshot handle. Does MiniDumpWriteDump/NtReadVirtualMemory on SnapShot of LSASS instad of original LSASS itself hence evades some AV/EDR. | ![](https://img.shields.io/github/stars/pwn1sher/CS-BOFs) | ![](https://img.shields.io/github/languages/top/pwn1sher/CS-BOFs) |
| Auxiliary | [getsystem](https://github.com/pwn1sher/CS-BOFs/tree/main/get-system) | get system by duplicating winlogon's token. | ![](https://img.shields.io/github/stars/pwn1sher/CS-BOFs) | ![](https://img.shields.io/github/languages/top/pwn1sher/CS-BOFs) |
| Auxiliary | [Silent Lsass Dump](https://github.com/guervild/BOFs) | Silent Lsass Dump | ![](https://img.shields.io/github/stars/guervild/BOFs) | ![](https://img.shields.io/github/languages/top/guervild/BOFs) |
| Auxiliary | [unhook-bof](https://github.com/Cobalt-Strike/unhook-bof) | This is a Beacon Object File to refresh DLLs and remove their hooks. | ![](https://img.shields.io/github/stars/Cobalt-Strike/unhook-bof) | ![](https://img.shields.io/github/languages/top/Cobalt-Strike/unhook-bof) |
| Auxiliary | [Beacon Health Check Aggressor Script](https://github.com/Cobalt-Strike/beacon_health_check) | This aggressor script uses a beacon's note field to indicate the health status of a beacon. | ![](https://img.shields.io/github/stars/Cobalt-Strike/beacon_health_check) | ![](https://img.shields.io/github/languages/top/Cobalt-Strike/beacon_health_check) |
| Auxiliary | [Registry BOF](https://github.com/lpBunny/bof-registry) | A beacon object file for use with cobalt strike v4.1+. Supports querying, adding, and deleting keys/values of local and remote registries. | ![](https://img.shields.io/github/stars/lpBunny/bof-registry) | ![](https://img.shields.io/github/languages/top/lpBunny/bof-registry) |
| Auxiliary | [InlineExecute-Assembly](https://github.com/anthemtotheego/InlineExecute-Assembly) | InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module | ![](https://img.shields.io/github/stars/anthemtotheego/InlineExecute-Assembly) | ![](https://img.shields.io/github/languages/top/anthemtotheego/InlineExecute-Assembly) |
| Auxiliary | [CredBandit](https://github.com/xforcered/CredBandit) | CredBandit is a proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel. The memory dump is done by using NTFS transactions which allows us to write the dump to memory and the MiniDumpWriteDump API has been replaced with an adaptation of ReactOS's implementation of MiniDumpWriteDump. | ![](https://img.shields.io/github/stars/xforcered/CredBandit) | ![](https://img.shields.io/github/languages/top/xforcered/CredBandit) |
| Auxiliary | [Inject AMSI Bypass](https://github.com/boku7/injectAmsiBypass) | Cobalt Strike Beacon Object File (BOF) that bypasses AMSI in a remote process with code injection. | ![](https://img.shields.io/github/stars/boku7/injectAmsiBypass) | ![](https://img.shields.io/github/languages/top/boku7/injectAmsiBypass) |
| Auxiliary | [Firewall_Enumerator_BOF](https://github.com/EspressoCake/Firewall_Walker_BOF) | Cobalt Strike Beacon Object File (BOF) that bypasses AMSI in a remote process with code injection. | ![](https://img.shields.io/github/stars/EspressoCake/Firewall_Walker_BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/Firewall_Walker_BOF) |
| Auxiliary | [Detect-Hooks](https://github.com/anthemtotheego/Detect-Hooks) | Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR | ![](https://img.shields.io/github/stars/anthemtotheego/Detect-Hooks) | ![](https://img.shields.io/github/languages/top/anthemtotheego/Detect-Hooks) |
| Auxiliary | [unhook-bof](https://github.com/rsmudge/unhook-bof) | Remove API hooks from a Beacon process. | ![](https://img.shields.io/github/stars/rsmudge/unhook-bof) | ![](https://img.shields.io/github/languages/top/rsmudge/unhook-bof) |
| Auxiliary | [whereami](https://github.com/boku7/whereami) | Cobalt Strike "Where Am I?" Beacon Object File | ![](https://img.shields.io/github/stars/boku7/whereami) | ![](https://img.shields.io/github/languages/top/boku7/whereami) |
| Auxiliary | [HOLLOW](https://github.com/boku7/HOLLOW) | EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and execute shellcode | ![](https://img.shields.io/github/stars/boku7/HOLLOW) | ![](https://img.shields.io/github/languages/top/boku7/HOLLOW) |
| Auxiliary | [BOFs](https://github.com/RiccardoAncarani/BOFs) | send_shellcode_via_pipe;cat;wts_enum_remote_processes | ![](https://img.shields.io/github/stars/RiccardoAncarani/BOFs) | ![](https://img.shields.io/github/languages/top/RiccardoAncarani/BOFs) |
| Auxiliary | [SCShell](https://github.com/Mr-Un1k0d3r/SCShell) | SCShell is a fileless lateral movement tool that relies on ChangeServiceConfigA to run commands. | ![](https://img.shields.io/github/stars/Mr-Un1k0d3r/SCShell) | ![](https://img.shields.io/github/languages/top/Mr-Un1k0d3r/SCShell) |
| Auxiliary | [WinRMDLL](https://github.com/mez-0/winrmdll) | A while ago I produced CSharpWinRM which was alright, but I wanted to look at the WinRM C++ API properly. | ![](https://img.shields.io/github/stars/mez-0/winrmdll) | ![](https://img.shields.io/github/languages/top/mez-0/winrmdll) |
| Auxiliary | [LSASS Dumping With Foreign Handles](https://github.com/alfarom256/BOF-ForeignLsass) | LSASS Dumping With Foreign Handles | ![](https://img.shields.io/github/stars/alfarom256/BOF-ForeignLsass) | ![](https://img.shields.io/github/languages/top/alfarom256/BOF-ForeignLsass) |
| Auxiliary | [PPLDump BOF](https://github.com/EspressoCake/PPLDump_BOF) | this is a fully-fledged BOF to dump an arbitrary protected process.(LSASS) | ![](https://img.shields.io/github/stars/EspressoCake/PPLDump_BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/PPLDump_BOF) |
| Auxiliary | [PortBender](https://github.com/praetorian-inc/PortBender) | PortBender is a TCP port redirection utility that allows a red team operator to redirect inbound traffic destined for one TCP port (e.g., 445/TCP) to another TCP port (e.g., 8445/TCP). | ![](https://img.shields.io/github/stars/praetorian-inc/PortBender) | ![](https://img.shields.io/github/languages/top/praetorian-inc/PortBender) |
| Auxiliary | [BOF2Shellcode](https://github.com/FalconForceTeam/BOF2shellcode) | POC tool to convert a Cobalt Strike BOF into raw shellcode. | ![](https://img.shields.io/github/stars/FalconForceTeam/BOF2shellcode) | ![](https://img.shields.io/github/languages/top/FalconForceTeam/BOF2shellcode) |
| Auxiliary | [DLL Hijack Search Order BOF](https://github.com/EspressoCake/DLL-Hijack-Search-Order-BOF) | DLL Hijack Search Order Enumeration BOF | ![](https://img.shields.io/github/stars/EspressoCake/DLL-Hijack-Search-Order-BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/DLL-Hijack-Search-Order-BOF) |
| Auxiliary | [InlineWhispers2](https://github.com/Sh0ckFR/InlineWhispers2) | Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2 | ![](https://img.shields.io/github/stars/Sh0ckFR/InlineWhispers2) | ![](https://img.shields.io/github/languages/top/Sh0ckFR/InlineWhispers2) |
| Auxiliary | [NetUser](https://github.com/lengjibo/NetUser) | 使用windows api添加用户,可用于net无法使用时 | ![](https://img.shields.io/github/stars/lengjibo/NetUser) | ![](https://img.shields.io/github/languages/top/lengjibo/NetUser) |
| Auxiliary | [BOF-Nim](https://github.com/byt3bl33d3r/BOF-Nim) | 用Nim语言写BoF | ![](https://img.shields.io/github/stars/byt3bl33d3r/BOF-Nim) | ![](https://img.shields.io/github/languages/top/byt3bl33d3r/BOF-Nim) |
| Auxiliary | [Invoke-Bof](https://github.com/airbus-cert/Invoke-Bof) | Load any Beacon Object File using Powershell! | ![](https://img.shields.io/github/stars/airbus-cert/Invoke-Bof) | ![](https://img.shields.io/github/languages/top/airbus-cert/Invoke-Bof) |
| Auxiliary | [Cobalt-Clip](https://github.com/DallasFR/Cobalt-Clip) | Cobalt-clip is clipboard addons for cobaltstrike to interact with clipboard. With this you can dump, edit and monitor the content of q clipboard. | ![](https://img.shields.io/github/stars/DallasFR/Cobalt-Clip) | ![](https://img.shields.io/github/languages/top/DallasFR/Cobalt-Clip) |
| Auxiliary | [CoffLoader](https://github.com/OtterHacker/CoffLoader) | Load and execute COFF files and Cobalt Strike BOFs in-memory | ![](https://img.shields.io/github/stars/OtterHacker/CoffLoader) | ![](https://img.shields.io/github/languages/top/OtterHacker/CoffLoader) |
| Auxiliary | [COFFLoader2](https://github.com/Yaxser/COFFLoader2) | Load and execute COFF files and Cobalt Strike BOFs in-memory | ![](https://img.shields.io/github/stars/Yaxser/COFFLoader2) | ![](https://img.shields.io/github/languages/top/Yaxser/COFFLoader2) |
| Auxiliary | [Process Protection Level Enumerator BOF](https://github.com/EspressoCake/Process_Protection_Level_BOF) | A Syscall-only BOF file intended to grab process protection attributes, limited to a handful that Red Team operators and pentesters would commonly be interested in. | ![](https://img.shields.io/github/stars/EspressoCake/Process_Protection_Level_BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/Process_Protection_Level_BOF) |
| Auxiliary | [Toggle_Token_Privileges_BOF](https://github.com/EspressoCake/Toggle_Token_Privileges_BOF) | AAn (almost) syscall-only BOF file intended to either add or remove token privileges within the context of your current process. | ![](https://img.shields.io/github/stars/EspressoCake/Toggle_Token_Privileges_BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/Toggle_Token_Privileges_BOF) |
| Auxiliary | [Cobalt Strike BOF - Inject ETW Bypass](https://github.com/boku7/injectEtwBypass) | Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate) | ![](https://img.shields.io/github/stars/boku7/injectEtwBypass) | ![](https://img.shields.io/github/languages/top/boku7/injectEtwBypass) |
| Auxiliary | [HandleKatz_BOF](https://github.com//EspressoCake/HandleKatz_BOF) | PIC your Katz! Say hello to HandleKatz, our position independent Lsass dumper abusing cloned handles, direct system calls and a modified version of minidumpwritedump() | ![](https://img.shields.io/github/stars/EspressoCake/HandleKatz_BOF) | ![](https://img.shields.io/github/languages/top/EspressoCake/HandleKatz_BOF) |
| Auxiliary | [tgtdelegation](https://github.com/connormcgarr/tgtdelegation) | tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick" | ![](https://img.shields.io/github/stars/connormcgarr/tgtdelegation) | ![](https://img.shields.io/github/languages/top/connormcgarr/tgtdelegation) |
| Auxiliary | [nanodump](https://github.com/helpsystems/nanodump) | A Beacon Object File that creates a minidump of the LSASS process. | ![](https://img.shields.io/github/stars/helpsystems/nanodump) | ![](https://img.shields.io/github/languages/top/helpsystems/nanodump) |
| Auxiliary | [xPipe Cobalt Strike BOF (x64)](https://github.com/boku7/xPipe) | Cobalt Strike Beacon Object File (BOF) to list active Pipes & return their Owner & Discretionary Access Control List (DACL) permissions. | ![](https://img.shields.io/github/stars/boku7/xPipe) | ![](https://img.shields.io/github/languages/top/boku7/xPipe) |
| Auxiliary | [AddUser-Bof](https://github.com/0x3rhy/AddUser-Bof) | Cobalt Strike BOF that Add an admin user | ![](https://img.shields.io/github/stars/0x3rhy/AddUser-Bof) | ![](https://img.shields.io/github/languages/top/0x3rhy/AddUser-Bof) |
| Auxiliary | [ServiceMove-BOF](https://github.com/netero1010/ServiceMove-BOF) | Lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking | ![](https://img.shields.io/github/stars/netero1010/ServiceMove-BOF) | ![](https://img.shields.io/github/languages/top/netero1010/ServiceMove-BOF) |
| Auxiliary | [Detect-Hooks](https://github.com/xforcered/Detect-Hooks) | Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR | ![](https://img.shields.io/github/stars/xforcered/Detect-Hooks) | ![](https://img.shields.io/github/languages/top/xforcered/Detect-Hooks) |
| Auxiliary | [MemReader BoF](https://github.com/trainr3kt/MemReader_BoF) | MemReader Beacon Object File will allow you to search and extract specific strings from a target process memory and return what is found to the beacon output. | ![](https://img.shields.io/github/stars/trainr3kt/MemReader_BoF) | ![](https://img.shields.io/github/languages/top/trainr3kt/MemReader_BoF) |
| Auxiliary | [Readfile BoF](https://github.com/trainr3kt/Readfile_BoF) | Not the prettiest code, short sweet and to the point and will allow you to read file contents to beacon output. | ![](https://img.shields.io/github/stars/trainr3kt/Readfile_BoF) | ![](https://img.shields.io/github/languages/top/trainr3kt/Readfile_BoF) |
| Auxiliary | [ChromiumKeyDump](https://github.com/trainr3kt/Readfile_BoF) | BOF implementation of Chlonium tool to dump Chrome/Edge Masterkey and download Cookie/Login Data files | ![](https://img.shields.io/github/stars/crypt0p3g/bof-collection) | ![](https://img.shields.io/github/languages/top/crypt0p3g/bof-collection) |
| Auxiliary | [LdapSignCheck](https://github.com/cube0x0/LdapSignCheck) | Beacon Object File to scan a Domain Controller to see if LdapEnforceChannelBinding or LdapServerIntegrity has been modified to mitigate against relaying attacks. | ![](https://img.shields.io/github/stars/cube0x0/LdapSignCheck) | ![](https://img.shields.io/github/languages/top/cube0x0/LdapSignCheck) |
| Auxiliary | [DelegationBOF](https://github.com/IcebreakerSecurity/DelegationBOF) | This tool uses LDAP to check a domain for known abusable Kerberos delegation settings. Currently, it supports RBCD, Constrained, Constrained w/Protocol Transition, and Unconstrained Delegation checks. | ![](https://img.shields.io/github/stars/IcebreakerSecurity/DelegationBOF) | ![](https://img.shields.io/github/languages/top/IcebreakerSecurity/DelegationBOF) |
| Auxiliary | [RunOF](https://github.com/nettitude/RunOF) | A tool to run object files, mainly beacon object files (BOF), in .Net. | ![](https://img.shields.io/github/stars/nettitude/RunOF) | ![](https://img.shields.io/github/languages/top/nettitude/RunOF) |
| Auxiliary | [KillDefender_BOF](https://github.com/Octoberfest7/KillDefender_BOF) | Beacon Object File implementation of pwn1sher's KillDefender. | ![](https://img.shields.io/github/stars/Octoberfest7/KillDefender_BOF) | ![](https://img.shields.io/github/languages/top/Octoberfest7/KillDefender_BOF) |
| Auxiliary | [TokenStripBOF](https://github.com/nick-frischkorn/TokenStripBOF) | TokenStrip is a Beacon Object File implementation of pwn1sher's KillDefender project utilizing syscalls via InlineWhispers. | ![](https://img.shields.io/github/stars/nick-frischkorn/TokenStripBOF) | ![](https://img.shields.io/github/languages/top/nick-frischkorn/TokenStripBOF) |
| Auxiliary | [BOF - RDPHijack](https://github.com/netero1010/RDPHijack-BOF) | Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking. | ![](https://img.shields.io/github/stars/netero1010/RDPHijack-BOF) | ![](https://img.shields.io/github/languages/top/netero1010/RDPHijack-BOF) |
| Auxiliary | [Koh](https://github.com/GhostPack/Koh) | Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking. | ![](https://img.shields.io/github/stars/GhostPack/Koh) | ![](https://img.shields.io/github/languages/top/GhostPack/Koh) |
| Auxiliary | [RDPHijack](https://github.com/netero1010/RDPHijack-BOF) | Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking. | ![](https://img.shields.io/github/stars/netero1010/RDPHijack-BOF) | ![](https://img.shields.io/github/languages/top/netero1010/RDPHijack-BOF) |
| Auxiliary | [KDStab](https://github.com/Octoberfest7/KDStab) | BOF combination of KillDefender and Backstab. | ![](https://img.shields.io/github/stars/Octoberfest7/KDStab) | ![](https://img.shields.io/github/languages/top/Octoberfest7/KDStab) |
| Auxiliary | [Token Vault BOF for Cobalt Strike](https://github.com/Henkru/cs-token-vault) | This Beacon Object File (BOF) creates in-memory storage for stolen/duplicated Windows access tokens. | ![](https://img.shields.io/github/stars/Henkru/cs-token-vault) | ![](https://img.shields.io/github/languages/top/Henkru/cs-token-vault) |
| Auxiliary | [ASRenum](https://github.com/mlcsec/ASRenum-BOF) | Identify ASR rules, actions, and exclusion locations. | ![](https://img.shields.io/github/stars/mlcsec/ASRenum-BOF) | ![](https://img.shields.io/github/languages/top/mlcsec/ASRenum-BOF) |
| Auxiliary | [ThreadlessInject-BOF](https://github.com/iilegacyyii/ThreadlessInject-BOF) | BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released at BSides Cymru 2023. | ![](https://img.shields.io/github/stars/iilegacyyii/ThreadlessInject-BOF) | ![](https://img.shields.io/github/languages/top/iilegacyyii/ThreadlessInject-BOF) |
| Auxiliary | [Inline-Execute-PE](https://github.com/Octoberfest7/Inline-Execute-PE) | Execute unmanaged Windows executables in CobaltStrike Beacons. This enables Operators to use many third party tools (Mimikatz, Dsquery, Sysinternals tools, etc) without needing to drop them to disk, reformat them to position independent code using a tool like Donut, or create a new process to run them. | ![](https://img.shields.io/github/stars/Octoberfest7/Inline-Execute-PE) | ![](https://img.shields.io/github/languages/top/Octoberfest7/Inline-Execute-PE) |
| Auxiliary | [BOFs](https://github.com/snovvcrash/BOFs) | Subscribes to WNF notifications for a number of seconds. && Backdoors SCManager SDDL. | ![](https://img.shields.io/github/stars/snovvcrash/BOFs) | ![](https://img.shields.io/github/languages/top/snovvcrash/BOFs) |
| Auxiliary | [DomainPasswordSpray](https://github.com/Hagrid29/BOF-SprayAD) | Perform LDAP-based or Kerberos-based password spray using Windows API LogonUserSSPI. Skip disabled accounts, locked accounts and large BadPwdCount (if specified). | ![](https://img.shields.io/github/stars/Hagrid29/BOF-SprayAD) | ![](https://img.shields.io/github/languages/top/Hagrid29/BOF-SprayAD) |
| Auxiliary | [BOF-CredUI](https://github.com/Hagrid29/BOF-CredUI) | Credentials Collection via CredUIPromptForWindowsCredentials | ![](https://img.shields.io/github/stars/Hagrid29/BOF-CredUI) | ![](https://img.shields.io/github/languages/top/Hagrid29/BOF-CredUI) |
| Auxiliary | [Cookie-Graber-BOF](https://github.com/Mr-Un1k0d3r/Cookie-Graber-BOF) | C or BOF file to extract WebKit master key to decrypt user cookie. The C code can be used to compile an executable or a bof script for Cobalt Strike. | ![](https://img.shields.io/github/stars/Mr-Un1k0d3r/Cookie-Graber-BOF) | ![](https://img.shields.io/github/languages/top/Mr-Un1k0d3r/Cookie-Graber-BOF) |
| Auxiliary | [ScreenshotBOF](https://github.com/CodeXTF2/ScreenshotBOF) | An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory. | ![](https://img.shields.io/github/stars/CodeXTF2/ScreenshotBOF) | ![](https://img.shields.io/github/languages/top/CodeXTF2/ScreenshotBOF) |
| Auxiliary | [ScreenshotBOFPlus](https://github.com/baiyies/ScreenshotBOFPlus) | Take a screenshot without injection for Cobalt Strike. I only made minor optimizations to the existing code, and made it support the ability to get a complete screenshot when global scaling is initiated on Windows. | ![](https://img.shields.io/github/stars/baiyies/ScreenshotBOFPlus) | ![](https://img.shields.io/github/languages/top/baiyies/ScreenshotBOFPlus) |
| Auxiliary | [Elevate-System-Trusted-BOF](https://github.com/Mr-Un1k0d3r/Elevate-System-Trusted-BOF) | This BOF can be used to elevate the current beacon to SYSTEM and obtain the TrustedInstaller group privilege. The impersonation is done through the SetThreadToken API. | ![](https://img.shields.io/github/stars/Mr-Un1k0d3r/Elevate-System-Trusted-BOF) | ![](https://img.shields.io/github/languages/top/Mr-Un1k0d3r/Elevate-System-Trusted-BOF) |
| Auxiliary | [Hidden Desktop BOF](https://github.com/WKL-Sec/HiddenDesktop) | Hidden Desktop (often referred to as HVNC) is a tool that allows operators to interact with a remote desktop session without the user knowing. | ![](https://img.shields.io/github/stars/WKL-Sec/HiddenDesktop) | ![](https://img.shields.io/github/languages/top/WKL-Sec/HiddenDesktop) |
| Auxiliary | [DropSpawn](https://github.com/Octoberfest7/DropSpawn_BOF) | DropSpawn is a CobaltStrike BOF used to spawn additional Beacons via a relatively unknown method of DLL hijacking. Works x86-x86, x64-x64, and x86-x64/vice versa. Use as an alternative to process injection. | ![](https://img.shields.io/github/stars/Octoberfest7/DropSpawn_BOF) | ![](https://img.shields.io/github/languages/top/Octoberfest7/DropSpawn_BOF) |
| Auxiliary | [Nanorobeus](https://github.com/wavvs/nanorobeus) | COFF file (BOF) for managing Kerberos tickets. | ![](https://img.shields.io/github/stars/wavvs/nanorobeus) | ![](https://img.shields.io/github/languages/top/wavvs/nanorobeus) |
| Auxiliary | [SelfDel](https://github.com/seventeenman/SelfDel-BOF) | Delete file regardless of whether the handle is used via SetFileInformationByHandle | ![](https://img.shields.io/github/stars/seventeenman/SelfDel-BOF) | ![](https://img.shields.io/github/languages/top/seventeenman/SelfDel-BOF) |
| Auxiliary | [GetWeChatBOF](https://github.com/pyroxenites/BOFTools/tree/main/GetWeChatBOF) | 用于获取微信信息的BOF测试文件, 仅支持3.9.6.33版本的偏移 | ![](https://img.shields.io/github/stars/pyroxenites/BOFTools) | ![](https://img.shields.io/github/languages/top/pyroxenites/BOFTools) |
| Auxiliary | [ShadowRDP](https://github.com/c3r3br4t3/ShadowRDP) | 用This repository contains two applications. One is a beacon object file, which is used to retrieve the authentication string, also known as the invitation. The other is a graphical user interface program that can be run on the operator's system behind a SOCKS proxy to connect to the remote desktop session. | ![](https://img.shields.io/github/stars/c3r3br4t3/ShadowRDP) | ![](https://img.shields.io/github/languages/top/c3r3br4t3/ShadowRDP) |
| Auxiliary | [SharpHound4Cobalt](https://github.com/Hypnoze57/SharpHound4Cobalt) | The SharpHound data (test file, json, zip, cache file) will not be written on the disk but only sent to Cobalt Strike downloads through BOF.NET library. | ![](https://img.shields.io/github/stars/Hypnoze57/SharpHound4Cobalt) | ![](https://img.shields.io/github/languages/top/Hypnoze57/SharpHound4Cobalt) |
| Exploit | [CVE-2020-0796-BOF](https://github.com/rsmudge/CVE-2020-0796-BOF) | SMBGhost LPE | ![](https://img.shields.io/github/stars/rsmudge/CVE-2020-0796-BOF) | ![](https://img.shields.io/github/languages/top/rsmudge/CVE-2020-0796-BOF) |
| Exploit | [ZeroLogon-BOF](https://github.com/rsmudge/ZeroLogon-BOF) | ZeroLogon | ![](https://img.shields.io/github/stars/rsmudge/ZeroLogon-BOF) | ![](https://img.shields.io/github/languages/top/rsmudge/ZeroLogon-BOF) |
| Exploit | [kernel-mii](https://github.com/NorthwaveSecurity/kernel-mii) | Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551. | ![](https://img.shields.io/github/stars/NorthwaveSecurity/kernel-mii) | ![](https://img.shields.io/github/languages/top/NorthwaveSecurity/kernel-mii) |
| Exploit | [PrivKit](https://github.com/mertdas/PrivKit) | PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS. | ![](https://img.shields.io/github/stars/mertdas/PrivKit) | ![](https://img.shields.io/github/languages/top/mertdas/PrivKit) |
| Exploit | [CVE-2023-36874](https://github.com/Octoberfest7/CVE-2023-36874_BOF) | About
Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE. | ![](https://img.shields.io/github/stars/Octoberfest7/CVE-2023-36874_BOF) | ![](https://img.shields.io/github/languages/top/Octoberfest7/CVE-2023-36874_BOF) |
| Persistence | [SPAWN](https://github.com/boku7/spawn) | Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks by spawning sacrificial process with Arbitrary Code Guard (ACG), BlockDll, and PPID spoofing. | ![](https://img.shields.io/github/stars/boku7/spawn) | ![](https://img.shields.io/github/languages/top/boku7/spawn) |
| Persistence | [PersistBOF](https://github.com/IcebreakerSecurity/PersistBOF) | A tool to help automate common persistence mechanisms. Currently supports Print Monitor (SYSTEM), Time Provider (Network Service), Start folder shortcut hijacking (User), and Junction Folder (User). | ![](https://img.shields.io/github/stars/IcebreakerSecurity/PersistBOF) | ![](https://img.shields.io/github/languages/top/IcebreakerSecurity/PersistBOF) |
| BypassAV | [ClipboardWindow-Inject](https://github.com/BronzeTicket/ClipboardWindow-Inject) | Beacon Object File (BOF) that injects beacon shellcode into remote process, avoiding the usage of common monitored APIs. | ![](https://img.shields.io/github/stars/BronzeTicket/ClipboardWindow-Inject) | ![](https://img.shields.io/github/languages/top/BronzeTicket/ClipboardWindow-Inject) |
| BypassAV | [SigFlip](https://github.com/med0x2e/SigFlip) | SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) in a way that doesn't affect or break the existing authenticode signature, in other words you can change PE file checksum/hash by embedding data (i.e shellcode) without breaking the file signature, integrity checks or PE file functionality. | ![](https://img.shields.io/github/stars/med0x2e/SigFlip) | ![](https://img.shields.io/github/languages/top/med0x2e/SigFlip) |
| BypassAV | [BokuLoader](https://github.com/boku7/BokuLoader) | Cobalt Strike User-Defined Reflective Loader written in Assembly & C for advanced evasion capabilities. | ![](https://img.shields.io/github/stars/boku7/BokuLoader) | ![](https://img.shields.io/github/languages/top/boku7/BokuLoader) |
| BypassAV | [AddDefenderExclusions](https://github.com/Like0x/AddDefenderExclusions-BOF) | AddDefenderExclusions Beacon Object File Resources. | ![](https://img.shields.io/github/stars/Like0x/AddDefenderExclusions-BOF) | ![](https://img.shields.io/github/languages/top/Like0x/AddDefenderExclusions-BOF) |
| BypassAV | [BOFMask](https://github.com/passthehashbrowns/BOFMask) | it demonstrates a technique to stealthily run BOFs without exposing Beacon to detection. | ![](https://img.shields.io/github/stars/passthehashbrowns/BOFMask) | ![](https://img.shields.io/github/languages/top/passthehashbrowns/BOFMask) |
| BypassUAC | [Trusted Path UAC Bypass](https://github.com/netero1010/TrustedPath-UACBypass-BOF) | Beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.exe" by using DCOM object. | ![](https://img.shields.io/github/stars/netero1010/TrustedPath-UACBypass-BOF) | ![](https://img.shields.io/github/languages/top/netero1010/TrustedPath-UACBypass-BOF) |
| BypassUAC | [EventViewerUAC_BOF](https://github.com/Octoberfest7/EventViewerUAC_BOF) | This is a Beacon Object File implementation of the Event Viewer deserialization UAC bypass discovered by @orange_8361 and the POC put together by CsEnox. | ![](https://img.shields.io/github/stars/Octoberfest7/EventViewerUAC_BOF) | ![](https://img.shields.io/github/languages/top/Octoberfest7/EventViewerUAC_BOF) |### 0x04 Aggressor Script
| Type | Name | Description | Popularity | Language |
|:---:|:---:|:---:|:---:|:---:|
| BypassAV | [BypassAV](https://github.com/hack2fun/BypassAV) | 用于快速生成免杀的可执行文件 | ![](https://img.shields.io/github/stars/hack2fun/BypassAV) | ![](https://img.shields.io/github/languages/top/hack2fun/BypassAV) |
| BypassAV | [BypassAV](https://github.com/hack2fun/BypassAV) | 本质上利用的ps2exe.ps1脚本编译为exe,只是不想在命令行里操作,将其写为cna脚本,方便直接快速生成免杀的可执行文件且只有50KB,目前支持exe、ps1文件格式。 | ![](https://img.shields.io/github/stars/cseroad/bypassAV) | ![](https://img.shields.io/github/languages/top/cseroad/bypassAV) |
| BypassAV | [scrun](https://github.com/k8gege/scrun) | BypassAV ShellCode Loader (Cobaltstrike/Metasploit) [Useage](https://www.cnblogs.com/k8gege/p/11223393.html) | ![](https://img.shields.io/github/stars/k8gege/scrun) | ![](https://img.shields.io/github/languages/top/k8gege/scrun) |
| BypassAV | [ShellCode_Loader](https://github.com/Axx8/ShellCode_Loader) | Msf&CobaltStrike免杀ShellCode加载器 | ![](https://img.shields.io/github/stars/Axx8/ShellCode_Loader) | ![](https://img.shields.io/github/languages/top/Axx8/ShellCode_Loader) |
| BypassAV | [beacon-c2-go](https://github.com/wahyuhadi/beacon-c2-go) | beacon-c2-go (Cobaltstrike/Metasploit) | ![](https://img.shields.io/github/stars/wahyuhadi/beacon-c2-go) | ![](https://img.shields.io/github/languages/top/wahyuhadi/beacon-c2-go) |
| BypassAV | [C--Shellcode](https://github.com/OneHone/C--Shellcode) | python ShellCode Loader (Cobaltstrike&Metasploit) [Useage](http://hone.cool/2019/11/26/%E5%85%8D%E6%9D%80-C-Shellcode%E5%8A%A0%E8%BD%BD%E5%99%A8/) | ![](https://img.shields.io/github/stars/OneHone/C--Shellcode) | ![](https://img.shields.io/github/languages/top/OneHone/C--Shellcode) |
| BypassAV | [Doge-Loader](https://github.com/timwhitez/Doge-Loader) | Cobalt Strike Shellcode Loader by Golang | ![](https://img.shields.io/github/stars/timwhitez/Doge-Loader) | ![](https://img.shields.io/github/languages/top/timwhitez/Doge-Loader) |
| BypassAV | [CS-Loader](https://github.com/Gality369/CS-Loader) | CS免杀,包括python版和C版本的 | ![](https://img.shields.io/github/stars/Gality369/CS-Loader) | ![](https://img.shields.io/github/languages/top/Gality369/CS-Loader) |
| BypassAV | [CSSG](https://github.com/RCStep/CSSG) | Cobalt Strike Shellcode Generator. Generates beacon stageless shellcode with exposed exit method, additional formatting, encryption, encoding, compression, multiline output, etc | ![](https://img.shields.io/github/stars/RCStep/CSSG) | ![](https://img.shields.io/github/languages/top/RCStep/CSSG) |
| BypassAV | [Alaris](https://github.com/cribdragg3r/Alaris) | Alaris is a new and sneaky shellcode loader capable of bypassing most EDR systems as of today (02/28/2021). It uses several known TTP’s that help protect the malware and it’s execution flow. | ![](https://img.shields.io/github/stars/cribdragg3r/Alaris) | ![](https://img.shields.io/github/languages/top/cribdragg3r/Alaris) |
| BypassAV | [CarbonMonoxide](https://github.com/rkervella/CarbonMonoxide) | EDR Evasion - Combination of SwampThing - TikiTorch | ![](https://img.shields.io/github/stars/rkervella/CarbonMonoxide) | ![](https://img.shields.io/github/languages/top/rkervella/CarbonMonoxide) |
| BypassAV | [bypassAV-1](https://github.com/jas502n/bypassAV-1) | 条件触发式远控 VT 6/70 免杀国内杀软及defender、卡巴斯基等主流杀软. | ![](https://img.shields.io/github/stars/jas502n/bypassAV-1) | ![](https://img.shields.io/github/languages/top/jas502n/bypassAV-1) |
| BypassAV | [ScareCrow](https://github.com/optiv/ScareCrow) | ScareCrow is a payload creation framework for generating loaders for the use of side loading (not injection) into a legitimate Windows process (bypassing Application Whitelisting controls). | ![](https://img.shields.io/github/stars/optiv/ScareCrow) | ![](https://img.shields.io/github/languages/top/optiv/ScareCrow) |
| BypassAV | [Dent](https://github.com/optiv/Dent) | A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors. | ![](https://img.shields.io/github/stars/optiv/Dent) | ![](https://img.shields.io/github/languages/top/optiv/Dent) |
| BypassAV | [PEzor](https://github.com/phra/PEzor) | Open-Source PE Packer. | ![](https://img.shields.io/github/stars/phra/PEzor) | ![](https://img.shields.io/github/languages/top/phra/PEzor) |
| BypassAV | [FuckThatPacker](https://github.com/Unknow101/FuckThatPacker) | A simple python packer to easily bypass Windows Defender | ![](https://img.shields.io/github/stars/Unknow101/FuckThatPacker) | ![](https://img.shields.io/github/languages/top/Unknow101/FuckThatPacker) |
| BypassAV | [goShellCodeByPassVT](https://github.com/fcre1938/goShellCodeByPassVT) | Go编译-race参数实现VT全免杀 | ![](https://img.shields.io/github/stars/fcre1938/goShellCodeByPassVT) | ![](https://img.shields.io/github/languages/top/fcre1938/goShellCodeByPassVT) |
| BypassAV | [HouQing](https://github.com/An0ny-m0us/DesertFox) | Advanced AV Evasion Tool For Red Team Ops | ![](https://img.shields.io/github/stars/An0ny-m0us/DesertFox) | ![](https://img.shields.io/github/languages/top/An0ny-m0us/DesertFox) |
| BypassAV | [DesertFox](https://github.com/Hangingsword/HouQing) | 使用Golang实现免杀加载CobaltStrike和Metasploit的shellcode,目前免杀火绒、Avast、腾讯安全管家、360全家桶等主机安全软件。 | ![](https://img.shields.io/github/stars/Hangingsword/HouQing) | ![](https://img.shields.io/github/languages/top/Hangingsword/HouQing) |
| BypassAV | [DInjector](https://github.com/snovvcrash/DInjector) | This repository is an accumulation of code snippets for various shellcode injection techniques using fantastic D/Invoke API | ![](https://img.shields.io/github/stars/snovvcrash/DInjector) | ![](https://img.shields.io/github/languages/top/snovvcrash/DInjector) |
| BypassAV | [GoBypass](https://github.com/4ra1n/GoBypass) | Golang免杀马生成工具(该工具仅针对Windows系统) | ![](https://img.shields.io/github/stars/4ra1n/GoBypass) | ![](https://img.shields.io/github/languages/top/4ra1n/GoBypass) |
| BypassAV | [Bypass-script](https://github.com/sssqp/bypass-script) | 使用 GoBypass 来进行免杀生成 | ![](https://img.shields.io/github/stars/sssqp/bypass-scripts) | ![](https://img.shields.io/github/languages/top/sssqp/bypass-script) |
| BypassAV | [CobaltWhispers](https://github.com/NVISOsecurity/CobaltWhispers) | CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files for Cobalt Strike to perform process injection, persistence and more, leveraging direct syscalls to bypass EDR/AV. | ![](https://img.shields.io/github/stars/NVISOsecurity/CobaltWhispers) | ![](https://img.shields.io/github/languages/top/NVISOsecurity/CobaltWhispers) |
| BypassAV | [AceLdr](https://github.com/kyleavery/AceLdr) | Cobalt Strike UDRL for memory scanner evasion. | ![](https://img.shields.io/github/stars/kyleavery/AceLdr) | ![](https://img.shields.io/github/languages/top/kyleavery/AceLdr) |
| BypassAV | [SharpTerminator](https://github.com/mertdas/SharpTerminator) | Terminate AV/EDR Processes using kernel driver | ![](https://img.shields.io/github/stars/mertdas/SharpTerminator) | ![](https://img.shields.io/github/languages/top/mertdas/SharpTerminator) |
| BypassUAC | [UAC-SilentClean](https://github.com/EncodeGroup/UAC-SilentClean) | This project implements a DLL planting technique to bypass UAC Always Notify and execute code in a high integrity process. | ![](https://img.shields.io/github/stars/EncodeGroup/UAC-SilentClean) | ![](https://img.shields.io/github/languages/top/EncodeGroup/UAC-SilentClean) |
| BypassUAC | [csload.net](https://github.com/YDHCUI/csload.net) | A cobaltStrike Shellcode loader, can bypass most of AV | ![](https://img.shields.io/github/stars/YDHCUI/csload.net) | ![](https://img.shields.io/github/languages/top/YDHCUI/csload.net) |
| Dev | [cs-rdll-example](https://github.com/rxwx/cs-rdll-ipc-example) | This is an example code pattern for using named pipes for IPC with ReflectiveDlls in Cobalt Strike. | ![](https://img.shields.io/github/stars/rxwx/cs-rdll-ipc-example) | ![](https://img.shields.io/github/languages/top/rxwx/cs-rdll-ipc-example) |
| Dev | [Titan](https://github.com/SecIdiot/titan) | Titan: A generic user defined reflective DLL for Cobalt Strike. | ![](https://img.shields.io/github/stars/SecIdiot/titan) | ![](https://img.shields.io/github/languages/top/SecIdiot/titan) |
| Dev | [GECC](https://github.com/Lz1y/GECC) | Go External C2 Client implementation for cobalt strike. | ![](https://img.shields.io/github/stars/Lz1y/GECC) | ![](https://img.shields.io/github/languages/top/Lz1y/GECC) |
| Dev | [CobaltStrike beacon in rust](https://github.com/b1tg/cobaltstrike-beacon-rust) | CobaltStrike beacon in rust. | ![](https://img.shields.io/github/stars/b1tg/cobaltstrike-beacon-rust) | ![](https://img.shields.io/github/languages/top/b1tg/cobaltstrike-beacon-rust) |
| Recon | [red-team-scripts](https://github.com/threatexpress/red-team-scripts) | perform some rudimentary Windows host enumeration with Beacon built-in commands | ![](https://img.shields.io/github/stars/threatexpress/red-team-scripts) | ![](https://img.shields.io/github/languages/top/threatexpress/red-team-scripts) |
| Recon | [Registry-Recon](https://github.com/optiv/Registry-Recon) | Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon. | ![](https://img.shields.io/github/stars/optiv/Registry-Recon) | ![](https://img.shields.io/github/languages/top/optiv/Registry-Recon) |
| Recon | [aggressor-powerview](https://github.com/tevora-threat/aggressor-powerview) | All functions listed in the PowerView about page are included in this with all arguments for each function. [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) | ![](https://img.shields.io/github/stars/tevora-threat/aggressor-powerview) | ![](https://img.shields.io/github/languages/top/tevora-threat/aggressor-powerview) |
| Recon | [PowerView3-Aggressor](https://github.com/tevora-threat/PowerView3-Aggressor) | PowerView Aggressor Script for CobaltStrike [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) | ![](https://img.shields.io/github/stars/tevora-threat/PowerView3-Aggressor) | ![](https://img.shields.io/github/languages/top/tevora-threat/PowerView3-Aggressor) |
| Recon | [AggressorScripts](https://github.com/C0axx/AggressorScripts) | Sharphound-Aggressor- A user menu for the SharpHound ingestor | ![](https://img.shields.io/github/stars/C0axx/AggressorScripts) | ![](https://img.shields.io/github/languages/top/C0axx/AggressorScripts) |
| Recon | [ServerScan](https://github.com/Adminisme/ServerScan) | 内网横向信息收集的高并发网络扫描、服务探测工具。 | ![](https://img.shields.io/github/stars/Adminisme/ServerScan) | ![](https://img.shields.io/github/languages/top/Adminisme/ServerScan) |
| Recon | [TailorScan](https://github.com/uknowsec/TailorScan) | 端口扫描+探测网卡+ms17010探测 | ![](https://img.shields.io/github/stars/uknowsec/TailorScan) | ![](https://img.shields.io/github/languages/top/uknowsec/TailorScan) |
| Recon | [AggressiveProxy](https://github.com/EncodeGroup/AggressiveProxy) | LetMeOutSharp will try to enumerate all available proxy configurations and try to communicate with the Cobalt Strike server over HTTP(s) using the identified proxy configurations. | ![](https://img.shields.io/github/stars/EncodeGroup/AggressiveProxy) | ![](https://img.shields.io/github/languages/top/EncodeGroup/AggressiveProxy) |
| Recon | [Spray-AD](https://github.com/outflanknl/Spray-AD) | A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords. | ![](https://img.shields.io/github/stars/outflanknl/Spray-AD) | ![](https://img.shields.io/github/languages/top/outflanknl/Spray-AD) |
| Recon | [Ladon](https://github.com/k8gege/Ladon) | Ladon一款用于大型网络渗透的多线程插件化综合扫描神器,含端口扫描、服务识别、网络资产、密码爆破、高危漏洞检测以及一键GetShell,支持批量A段/B段/C段以及跨网段扫描,支持URL、主机、域名列表扫描。 | ![](https://img.shields.io/github/stars/k8gege/Ladon) | ![](https://img.shields.io/github/languages/top/k8gege/Ladon) |
| Recon | [Ladon for Cobalt Strike](https://github.com/k8gege/Aggressor) | Ladon for Cobalt Strike(巨龙拉冬套件) | ![](https://img.shields.io/github/stars/k8gege/Aggressor) | ![](https://img.shields.io/github/languages/top/k8gege/Aggressor) |
| Recon | [Recon-AD](https://github.com/outflanknl/Recon-AD) | Recon-AD, an AD recon tool based on ADSI and reflective DLL’s | ![](https://img.shields.io/github/stars/outflanknl/Recon-AD) | ![](https://img.shields.io/github/languages/top/outflanknl/Recon-AD) |
| Exploit | [XSS-Fishing2-CS](https://github.com/TheKingOfDuck/XSS-Fishing2-CS) | 鱼儿在cs上线后自动收杆 / Automatically stop fishing in javascript after the fish is hooked | ![](https://img.shields.io/github/stars/TheKingOfDuck/XSS-Fishing2-CS) | ![](https://img.shields.io/github/languages/top/TheKingOfDuck/XSS-Fishing2-CS) |
| Exploit | [XSS-Phishing](https://github.com/timwhitez/XSS-Phishing) | xss钓鱼,cna插件配合php后端收杆 | ![](https://img.shields.io/github/stars/timwhitez/XSS-Phishing) | ![](https://img.shields.io/github/languages/top/timwhitez/XSS-Phishing) |
| Exploit | [custom_payload_generator](https://github.com/offsecginger/AggressorScripts) | CobaltStrike3.0+ --> creates various payloads for Cobalt Strike's Beacon. Current payload formats | ![](https://img.shields.io/github/stars/offsecginger/AggressorScripts) | ![](https://img.shields.io/github/languages/top/offsecginger/AggressorScripts) |
| Exploit | [CrossC2](https://github.com/gloxec/CrossC2) | CrossC2 framework - Generator CobaltStrike's cross-platform beacon | ![](https://img.shields.io/github/stars/gloxec/CrossC2) | ![](https://img.shields.io/github/languages/top/gloxec/CrossC2) |
| Exploit | [CrossC2 Kit](https://github.com/CrossC2/CrossC2Kit) | CrossC2Kit provides some interfaces for users to call to manipulate the CrossC2 Beacon session, thereby extending the functionality of Cobalt Strike. | ![](https://img.shields.io/github/stars/CrossC2/CrossC2Kit) | ![](https://img.shields.io/github/languages/top/CrossC2/CrossC2Kit) |
| Exploit | [Cobaltstrike-MS17-010](https://github.com/phink-team/Cobaltstrike-MS17-010) | ms17-010 exploit tool and scanner. | ![](https://img.shields.io/github/stars/phink-team/Cobaltstrike-MS17-010) | ![](https://img.shields.io/github/languages/top/phink-team/Cobaltstrike-MS17-010) |
| Exploit | [AES-PowerShellCode](https://github.com/offsecginger/AES-PowerShellCode) | Standalone version of my AES Powershell payload for Cobalt Strike. | ![](https://img.shields.io/github/stars/offsecginger/AES-PowerShellCode) | ![](https://img.shields.io/github/languages/top/offsecginger/AES-PowerShellCode) |
| Exploit | [SweetPotato_CS](https://github.com/Tycx2ry/SweetPotato_CS) | CobaltStrike4.x --> SweetPotato | ![](https://img.shields.io/github/stars/Tycx2ry/SweetPotato_CS) | ![](https://img.shields.io/github/languages/top/Tycx2ry/SweetPotato_CS) |
| Exploit | [ElevateKit](https://github.com/rsmudge/ElevateKit) | privilege escalation exploits | ![](https://img.shields.io/github/stars/rsmudge/ElevateKit) | ![](https://img.shields.io/github/languages/top/rsmudge/ElevateKit) |
| Exploit | [CVE-2018-4878](https://github.com/vysecurity/CVE-2018-4878) | CVE-2018-4878 | ![](https://img.shields.io/github/stars/vysecurity/CVE-2018-4878) | ![](https://img.shields.io/github/languages/top/vysecurity/CVE-2018-4878) |
| Exploit | [Aggressor-Scripts](https://github.com/RhinoSecurityLabs/Aggressor-Scripts) | The only current public is UACBypass, whose readme can be found inside its associated folder. | ![](https://img.shields.io/github/stars/RhinoSecurityLabs/Aggressor-Scripts) | ![](https://img.shields.io/github/languages/top/RhinoSecurityLabs/Aggressor-Scripts) |
| Exploit | [CVE_2020_0796_CNA](https://github.com/Rvn0xsy/CVE_2020_0796_CNA) | 基于[ReflectiveDLLInjection](https://github.com/stephenfewer/ReflectiveDLLInjection)实现的本地提权漏洞 | ![](https://img.shields.io/github/stars/Rvn0xsy/CVE_2020_0796_CNA) | ![](https://img.shields.io/github/languages/top/Rvn0xsy/CVE_2020_0796_CNA) |
| Exploit | [DDEAutoCS](https://github.com/p292/DDEAutoCS) | setup our stage(d) Web Delivery attack | ![](https://img.shields.io/github/stars/p292/DDEAutoCS) | ![](https://img.shields.io/github/languages/top/p292/DDEAutoCS) |
| Exploit | [geacon](https://github.com/darkr4y/geacon) | Implement CobaltStrike's Beacon in Go (can be used in Linux) | ![](https://img.shields.io/github/stars/darkr4y/geacon) | ![](https://img.shields.io/github/languages/top/darkr4y/geacon) |
| Exploit | [geacon_pro](https://github.com//H4de5-7/geacon_pro) | geacon_pro is an Anti-Virus bypassing CobaltStrike Beacon written in Golang based on geacon project. | ![](https://img.shields.io/github/stars//H4de5-7/geacon_pro) | ![](https://img.shields.io/github/languages/top//H4de5-7/geacon_pro) |
| Exploit | [geacon_plus](https://github.com/Z3ratu1/geacon_plus) | golang实现的CobaltStrike stageless http(s) beacon,在geacon项目基础上进行了较多扩展 | ![](https://img.shields.io/github/stars/Z3ratu1/geacon_plus) | ![](https://img.shields.io/github/languages/top/Z3ratu1/geacon_plus) |
| Exploit | [SpoolSystem](https://github.com/nccgroup/nccfsas/blob/main/Tools/spoolsystem/Readme.md) | SpoolSystem is a CNA script for Cobalt Strike which uses the Print Spooler named pipe impersonation trick to gain SYSTEM privileges. | ![](https://img.shields.io/github/stars/nccgroup/nccfsas) | ![](https://img.shields.io/github/languages/top/nccgroup/nccfsas) |
| Exploit | [CVE-2021-1675_RDL_LPE](https://github.com/mstxq17/CVE-2021-1675_RDL_LPE) | PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR | ![](https://img.shields.io/github/stars/mstxq17/CVE-2021-1675_RDL_LPE) | ![](https://img.shields.io/github/languages/top/mstxq17/CVE-2021-1675_RDL_LPE) |
| Exploit | [KRBTGS](https://github.com/realoriginal/krbtgs) | KRBTGS is a post-exploitation option for Cobalt Strike to retrieve a working TGT for the current user that Beacon is running as, or impersonating. The attack does not require the user's password, and only assumes that the user you are running as is within a domain-joined environment. It attempts to guess the encryption type by choosing the strongest to least strong. The resulting .ccache can be converted into KIRBI format to be imported into other Beacons, or passed to other toolsets such as Impacket's example scripts to perform your post-exploitation endeavours. | ![](https://img.shields.io/github/stars/realoriginal/krbtgs) | ![](https://img.shields.io/github/languages/top/realoriginal/krbtgs) |
| Exploit | [PrintSpoofer-ReflectiveDLL](https://github.com/crisprss/PrintSpoofer) | PrintSpoofer的反射dll实现,结合Cobalt Strike使用 | ![](https://img.shields.io/github/stars/crisprss/PrintSpoofer) | ![](https://img.shields.io/github/languages/top/crisprss/PrintSpoofer) |
| Persistence | [persistence-aggressor-script](https://github.com/ZonkSec/persistence-aggressor-script) | persistence-aggressor-script | ![](https://img.shields.io/github/stars/ZonkSec/persistence-aggressor-script) | ![](https://img.shields.io/github/languages/top/ZonkSec/persistence-aggressor-script) |
| Persistence | [Peinject_dll](https://github.com/m0ngo0se/Peinject_dll) | 弃用winexec函数,使用shellexecute函数,程序流不在卡顿,达到真正的无感。 | ![](https://img.shields.io/github/stars/m0ngo0se/Peinject_dll) | ![](https://img.shields.io/github/languages/top/m0ngo0se/Peinject_dll) |
| Persistence | [TikiTorch](https://github.com/rasta-mouse/TikiTorch) | TikiTorch follows the same concept([CACTUSTORCH](https://github.com/vysecurity/CACTUSTORCH)) but has multiple types of process injection available, which can be specified by the user at compile time. | ![](https://img.shields.io/github/stars/rasta-mouse/TikiTorch) | ![](https://img.shields.io/github/languages/top/rasta-mouse/TikiTorch) |
| Persistence | [CACTUSTORCH](https://github.com/mdsecactivebreach/CACTUSTORCH) | A JavaScript and VBScript shellcode launcher. This will spawn a 32 bit version of the binary specified and inject shellcode into it. | ![](https://img.shields.io/github/stars/mdsecactivebreach/CACTUSTORCH) | ![](https://img.shields.io/github/languages/top/mdsecactivebreach/CACTUSTORCH) |
| Persistence | [UploadAndRunFrp](https://github.com/Ch1ngg/AggressorScript-UploadAndRunFrp) | 上传frpc并且运行frpc | ![](https://img.shields.io/github/stars/Ch1ngg/AggressorScript-UploadAndRunFrp) | ![](https://img.shields.io/github/languages/top/Ch1ngg/AggressorScript-UploadAndRunFrp) |
| Persistence | [persistence-aggressor-script](https://github.com/threatexpress/persistence-aggressor-script) | [Persistence Aggressor Script](https://zonksec.com/blog/persistence-aggressor-script/) | ![](https://img.shields.io/github/stars/threatexpress/persistence-aggressor-script) | ![](https://img.shields.io/github/languages/top/threatexpress/persistence-aggressor-script) |
| Persistence | [AggressiveGadgetToJScript](https://github.com/EncodeGroup/AggressiveGadgetToJScript) | Automate the generation of payloads using the GadgetToJScript technique. | ![](https://img.shields.io/github/stars/EncodeGroup/AggressiveGadgetToJScript) | ![](https://img.shields.io/github/languages/top/EncodeGroup/AggressiveGadgetToJScript) |
| Persistence | [FrpProPlugin](https://github.com/mstxq17/FrpProPlugin) | frp0.33修改版,过流量检测,免杀,支持加载远程配置文件可用于cs直接使用的插件 | ![](https://img.shields.io/github/stars/mstxq17/FrpProPlugin) | ![](https://img.shields.io/github/languages/top/mstxq17/FrpProPlugin) |
| Persistence | [Automatic-permission-maintenance](https://github.com/j5s/Automatic-permission-maintenance) | CobaltStrike 上线自动权限维持插件 | ![](https://img.shields.io/github/stars/j5s/Automatic-permission-maintenance) | ![](https://img.shields.io/github/languages/top/j5s/Automatic-permission-maintenance) |
| Persistence | [cobalt-strike-persistence](https://github.com/Cyri1s/cobalt-strike-persistence) | 使用者通过cobalt strike生成Web Delivery类型的payload,然后加载此脚本可以到达自启动效果 | ![](https://img.shields.io/github/stars/Cyri1s/cobalt-strike-persistence) | ![](https://img.shields.io/github/languages/top/Cyri1s/cobalt-strike-persistence) |
| Persistence | [Cobalt_Strike_CNA](https://github.com/yanghaoi/CobaltStrike_CNA) | 使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等。 | ![](https://img.shields.io/github/stars/yanghaoi/CobaltStrike_CNA) | ![](https://img.shields.io/github/languages/top/yanghaoi/CobaltStrike_CNA) |
| Persistence | [CustomKeyboardLayoutPersistence](https://github.com/NtQuerySystemInformation/CustomKeyboardLayoutPersistence) | Achieve execution using a custom keyboard layout, tested in Windows 11 Home version 21H2 | ![](https://img.shields.io/github/stars/NtQuerySystemInformation/CustomKeyboardLayoutPersistence) | ![](https://img.shields.io/github/languages/top/NtQuerySystemInformation/CustomKeyboardLayoutPersistence) |
| Persistence | [SharpEventPersist](https://github.com/improsec/SharpEventPersist) | Persistence by writing/reading shellcode from Event Log. | ![](https://img.shields.io/github/stars/improsec/SharpEventPersist) | ![](https://img.shields.io/github/languages/top/improsec/SharpEventPersist) |
| Auxiliary | [SharpZippo](https://github.com/OG-Sadpanda/SharpZippo) | List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly | ![](https://img.shields.io/github/stars/OG-Sadpanda/SharpZippo) | ![](https://img.shields.io/github/languages/top/OG-Sadpanda/SharpZippo) |
| Auxiliary | [SharpExcelibur](https://github.com/OG-Sadpanda/SharpExcelibur) | Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly | ![](https://img.shields.io/github/stars/OG-Sadpanda/SharpExcelibur) | ![](https://img.shields.io/github/languages/top/OG-Sadpanda/SharpExcelibur) |
| Auxiliary | [SharpSword](https://github.com/OG-Sadpanda/SharpSword) | Read the contents of DOCX files using Cobalt Strike's Execute-Assembly | ![](https://img.shields.io/github/stars/OG-Sadpanda/SharpSword) | ![](https://img.shields.io/github/languages/top/OG-Sadpanda/SharpSword) |
| Auxiliary | [SharpCat](https://github.com/OG-Sadpanda/SharpCat) | C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly | ![](https://img.shields.io/github/stars/OG-Sadpanda/SharpCat) | ![](https://img.shields.io/github/languages/top/OG-Sadpanda/SharpCat) |
| Auxiliary | [TabRenamer CNA](https://github.com/EspressoCake/DynamicTabRename) | This will allow programmatic renaming of tabs as you see fit, with toggles of your history as you see fit. | ![](https://img.shields.io/github/stars/EspressoCake/DynamicTabRename) | ![](https://img.shields.io/github/languages/top/EspressoCake/DynamicTabRename) |
| Auxiliary | [Liquid Snake](https://github.com/RiccardoAncarani/LiquidSnake) | LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript | ![](https://img.shields.io/github/stars/RiccardoAncarani/LiquidSnake) | ![](https://img.shields.io/github/languages/top/RiccardoAncarani/LiquidSnake) |
| Auxiliary | [TaskShell](https://github.com/RiccardoAncarani/TaskShell) | TaskShell 计划任务相关自动化操作 | ![](https://img.shields.io/github/stars/RiccardoAncarani/TaskShell) | ![](https://img.shields.io/github/languages/top/RiccardoAncarani/TaskShell) |
| Auxiliary | [generate-rotating-beacon](https://github.com/eddiezab/aggressor-scripts/blob/master/generate-rotating-beacon.cna) | 1. Generate a beacon for a given listener; 2. Host the file at a specified location;3. Monitor the weblog for fetching of the specified location; | ![](https://img.shields.io/github/stars/eddiezab/aggressor-scripts) | ![](https://img.shields.io/github/languages/top/eddiezab/aggressor-scripts) |
| Auxiliary | [ScareCrow-CobaltStrike](https://github.com/GeorgePatsias/ScareCrow-CobaltStrike) | A Cobalt Strike script for ScareCrow payload generation. Works with all Loaders. | ![](https://img.shields.io/github/stars/GeorgePatsias/ScareCrow-CobaltStrike) | ![](https://img.shields.io/github/languages/top/GeorgePatsias/ScareCrow-CobaltStrike) |
| Auxiliary | [AggressorScripts](https://github.com/capt-meelo/AggressorScripts) | CreateTicket; Seatbelt; SharpHound | ![](https://img.shields.io/github/stars/capt-meelo/AggressorScripts) | ![](https://img.shields.io/github/languages/top/capt-meelo/AggressorScripts) |
| Auxiliary | [SharpeningCobaltStrike](https://github.com/cube0x0/SharpeningCobaltStrike) | In realtime compiling of dotnet v35/v40 exe/dll binaries + obfuscation with ConfuserEx on your linux cobalt strike server. | ![](https://img.shields.io/github/stars/cube0x0/SharpeningCobaltStrike) | ![](https://img.shields.io/github/languages/top/cube0x0/SharpeningCobaltStrike) |
| Auxiliary | [CS_Mail_Tip](https://github.com/0x50j/CS_Mail_Tip) | Cobalt Strike主机上线邮件提醒插件 | ![](https://img.shields.io/github/stars/0x50j/CS_Mail_Tip) | ![](https://img.shields.io/github/languages/top/0x50j/CS_Mail_Tip) |
| Auxiliary | [Cobalt_Strike_Bot](https://github.com/r1is/Cobalt_Strike_Bot) | CobaltStrike上线通知,飞书群聊机器人、server酱通知 | ![](https://img.shields.io/github/stars/r1is/Cobalt_Strike_Bot) | ![](https://img.shields.io/github/languages/top/r1is/Cobalt_Strike_Bot) |
| Auxiliary | [Cobaltstrike-atexec](https://github.com/Rvn0xsy/Cobaltstrike-atexec) | 利用任务计划进行横向,需要与135端口、445端口进行通信 | ![](https://img.shields.io/github/stars/Rvn0xsy/Cobaltstrike-atexec) | ![](https://img.shields.io/github/languages/top/Rvn0xsy/Cobaltstrike-atexec) |
| Auxiliary | [Sharp-HackBrowserData](https://github.com/S3cur3Th1sSh1t/Sharp-HackBrowserData) | C#的HackBrowserData工具,方便在cs中直接内存加载 | ![](https://img.shields.io/github/stars/S3cur3Th1sSh1t/Sharp-HackBrowserData) | ![](https://img.shields.io/github/languages/top/S3cur3Th1sSh1t/Sharp-HackBrowserData) |
| Auxiliary | [HackBrowserData](https://github.com/idiotc4t/Reflective-HackBrowserData) | HackBrowserData的反射模块 | ![](https://img.shields.io/github/stars/idiotc4t/Reflective-HackBrowserData) | ![](https://img.shields.io/github/languages/top/idiotc4t/Reflective-HackBrowserData) |
| Auxiliary | [cobalt_sync](https://github.com/GhostManager/cobalt_sync) | Standalone Cobalt Strike Operation Logging Aggressor script for Ghostwriter 2.0+ | ![](https://img.shields.io/github/stars/GhostManager/cobalt_sync) | ![](https://img.shields.io/github/languages/top/GhostManager/cobalt_sync) |
| Auxiliary | [samdump](https://github.com/D1sAbl4/samdump) | Cobalt Strike samdump | ![](https://img.shields.io/github/stars/D1sAbl4/samdump) | ![](https://img.shields.io/github/languages/top/D1sAbl4/samdump) |
| Auxiliary | [CallBackDump](https://github.com/seventeenman/CallBackDump) | 能过卡巴、核晶、defender等杀软的dump lsass进程工具 | ![](https://img.shields.io/github/stars/seventeenman/CallBackDump) | ![](https://img.shields.io/github/languages/top/seventeenman/CallBackDump) |
| Auxiliary | [SharpeningCobaltStrike](https://github.com/cube0x0/SharpeningCobaltStrike) | In realtime compiling of dotnet v35/v40 exe/dll binaries + obfuscation with ConfuserEx on your linux cobalt strike server. | ![](https://img.shields.io/github/stars/cube0x0/SharpeningCobaltStrike) | ![](https://img.shields.io/github/languages/top/cube0x0/SharpeningCobaltStrike) |
| Auxiliary | [SharpCompile](https://github.com/SpiderLabs/SharpCompile) | SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. | ![](https://img.shields.io/github/stars/SpiderLabs/SharpCompile) | ![](https://img.shields.io/github/languages/top/SpiderLabs/SharpCompile) |
| Auxiliary | [Quickrundown](https://github.com/icebearfriend/Quickrundown) | Utilizing QRD will allow an operator to quickly characterize what processes are both known and unknown on a host through the use of colors and notes about the processes displayed. | ![](https://img.shields.io/github/stars/icebearfriend/Quickrundown) | ![](https://img.shields.io/github/languages/top/icebearfriend/Quickrundown) |
| Auxiliary | [NetUser](https://github.com/bopin2020/NetUser) | This tool achieves "net user" in Window API. I made this to be used with Cobalt Strike's execute-assembly,所以可以内存加载添加用户 | ![](https://img.shields.io/github/stars/bopin2020/NetUser) | ![](https://img.shields.io/github/languages/top/bopin2020/NetUser) |
| Auxiliary | [FileSearch](https://github.com/c1y2m3/FileSearch) | C++枚举磁盘列表、遍历指定盘搜索特定类型文件包括反射DLL版本。 | ![](https://img.shields.io/github/stars/c1y2m3/FileSearch) | ![](https://img.shields.io/github/languages/top/c1y2m3/FileSearch) |
| Auxiliary | [Phant0m_cobaltstrike](https://github.com/p292/Phant0m_cobaltstrike) | This script walks thread stacks of Event Log Service process (spesific svchost.exe) and identify Event Log Threads to kill Event Log Service Threads. So the system will not be able to collect logs and at the same time the Event Log Service will appear to be running. | ![](https://img.shields.io/github/stars/p292/Phant0m_cobaltstrike) | ![](https://img.shields.io/github/languages/top/p292/Phant0m_cobaltstrike) |
| Auxiliary | [NoPowerShell](https://github.com/bitsadmin/nopowershell) | NoPowerShell is a tool implemented in C# which supports executing PowerShell-like commands while remaining invisible to any PowerShell logging mechanisms. | ![](https://img.shields.io/github/stars/bitsadmin/nopowershell) | ![](https://img.shields.io/github/languages/top/bitsadmin/nopowershell) |
| Auxiliary | [EventLogMaster](https://github.com/QAX-A-Team/EventLogMaster) | RDP EventLog Master | ![](https://img.shields.io/github/stars/QAX-A-Team/EventLogMaster) | ![](https://img.shields.io/github/languages/top/QAX-A-Team/EventLogMaster) |
| Auxiliary | [ANGRYPUPPY](https://github.com/vysecurity/ANGRYPUPPY) | Bloodhound Attack Path Execution for Cobalt Strike | ![](https://img.shields.io/github/stars/vysecurity/ANGRYPUPPY) | ![](https://img.shields.io/github/languages/top/vysecurity/ANGRYPUPPY) |
| Auxiliary | [CobaltStrike_Script_Wechat_Push](https://github.com/a1ices/CobaltStrike_Script_Wechat_Push) | 上线微信提醒的插件,通过微信Server酱提醒 | ![](https://img.shields.io/github/stars/a1ices/CobaltStrike_Script_Wechat_Push) | ![](https://img.shields.io/github/languages/top/a1ices/CobaltStrike_Script_Wechat_Push) |
| Auxiliary | [CS-Aggressor-Scripts](https://github.com/secgroundzero/CS-Aggressor-Scripts) | slack and webhooks reminder | ![](https://img.shields.io/github/stars/secgroundzero/CS-Aggressor-Scripts) | ![](https://img.shields.io/github/languages/top/secgroundzero/CS-Aggressor-Scripts) |
| Auxiliary | [Aggressor-Scripts](https://github.com/skyleronken/Aggressor-Scripts) | surveying of powershell on targets (在对应的目标上检测powershell的相关信息) | ![](https://img.shields.io/github/stars/skyleronken/Aggressor-Scripts) | ![](https://img.shields.io/github/languages/top/skyleronken/Aggressor-Scripts) |
| Auxiliary | [cs-magik](https://github.com/tomsteele/cs-magik) | Implements an events channel and job queue using Redis for Cobalt Strike. | ![](https://img.shields.io/github/stars/tomsteele/cs-magik) | ![](https://img.shields.io/github/languages/top/tomsteele/cs-magik) |
| Auxiliary | [GetClipboard](https://github.com/0x3rhy/GetClipboard) | Cobalt Strike Reflective DLL Get clipboard content. The code basically comes from ReflectiveDLLInjection | ![](https://img.shields.io/github/stars/0x3rhy/GetClipboard) | ![](https://img.shields.io/github/languages/top/0x3rhy/GetClipboard) |
| Auxiliary | [AggressorScripts](https://github.com/zer0yu/AggressorScripts) | 查看进程的时候讲av进程标注为红色 | ![](https://img.shields.io/github/stars/zer0yu/AggressorScripts) | ![](https://img.shields.io/github/languages/top/zer0yu/AggressorScripts) |
| Auxiliary | [Beaconator](https://github.com/capt-meelo/Beaconator) | Beaconator is an aggressor script for Cobalt Strike used to generate a raw stageless shellcode and packing the generated shellcode using PEzor. | ![](https://img.shields.io/github/stars/capt-meelo/Beaconator) | ![](https://img.shields.io/github/languages/top/capt-meelo/Beaconator) |
| Auxiliary | [Raven](https://github.com/xorrior/raven) | CobaltStrike External C2 for Websockets | ![](https://img.shields.io/github/stars/xorrior/raven) | ![](https://img.shields.io/github/languages/top/xorrior/raven) |
| Auxiliary | [CobaltStrikeParser](https://github.com/Sentinel-One/CobaltStrikeParser) | Python parser for CobaltStrike Beacon's configuration | ![](https://img.shields.io/github/stars/Sentinel-One/CobaltStrikeParser) | ![](https://img.shields.io/github/languages/top/Sentinel-One/CobaltStrikeParser) |
| Auxiliary | [fakelogonscreen](https://github.com/bitsadmin/fakelogonscreen) | FakeLogonScreen is a utility to fake the Windows logon screen in order to obtain the user's password. | ![](https://img.shields.io/github/stars/bitsadmin/fakelogonscreen) | ![](https://img.shields.io/github/languages/top/bitsadmin/fakelogonscreen) |
| Auxiliary | [SyncDog](https://github.com/Lz1y/SyncDog) | Make bloodhound sync with cobaltstrike. | ![](https://img.shields.io/github/stars/Lz1y/SyncDog) | ![](https://img.shields.io/github/languages/top/Lz1y/SyncDog) |
| Auxiliary | [360SafeBrowsergetpass](https://github.com/hayasec/360SafeBrowsergetpass) | 一键辅助抓取360安全浏览器密码的CobaltStrike脚本,通过下载浏览器数据库、记录密钥来离线解密浏览器密码。 | ![](https://img.shields.io/github/stars/hayasec/360SafeBrowsergetpass) | ![](https://img.shields.io/github/languages/top/hayasec/360SafeBrowsergetpass) |
| Auxiliary | [SharpDecryptPwd](https://github.com/uknowsec/SharpDecryptPwd) | 对密码已保存在 Windwos 系统上的部分程序进行解析,包括:Navicat,TeamViewer,FileZilla,WinSCP,Xmangager系列产品(Xshell,Xftp)。 | ![](https://img.shields.io/github/stars/uknowsec/SharpDecryptPwd) | ![](https://img.shields.io/github/languages/top/uknowsec/SharpDecryptPwd) |
| Auxiliary | [List-GitHubAssembly](https://github.com/mdsecactivebreach/Execute-GithubAssembly-Aggressor) | Fetch a list of avaialble artifacts from the configured GitHub repo. | ![](https://img.shields.io/github/stars/mdsecactivebreach/Execute-GithubAssembly-Aggressor) | ![](https://img.shields.io/github/languages/top/mdsecactivebreach/Execute-GithubAssembly-Aggressor) |
| Auxiliary | [ExecuteAssembly](https://github.com/med0x2e/ExecuteAssembly) | ExecuteAssembly is an alternative of CS execute-assembly, built with C/C++ and it can be used to Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR Modules/AppDomainManager, Stomping Loader/.NET assembly PE DOS headers, Unlinking .NET related modules, bypassing ETW+AMSI, avoiding EDR hooks via NT static syscalls (x64) and hiding imports by dynamically resolving APIs via superfasthash hashing algorithm. | ![](https://img.shields.io/github/stars/med0x2e/ExecuteAssembly) | ![](https://img.shields.io/github/languages/top/med0x2e/ExecuteAssembly) |
| Auxiliary | [aggrokatz](https://github.com/sec-consult/aggrokatz) | aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely. | ![](https://img.shields.io/github/stars/sec-consult/aggrokatz) | ![](https://img.shields.io/github/languages/top/sec-consult/aggrokatz) |
| Auxiliary | [Zipper](https://github.com/outflanknl/Zipper) | This CobaltStrike tool allows Red teams to compress files and folders from local and UNC paths. This could be useful in situations where large files or folders need to be exfiltrated. After compressing a file or folder a random named zipfile is created within the user temp folder. | ![](https://img.shields.io/github/stars/outflanknl/Zipper) | ![](https://img.shields.io/github/languages/top/outflanknl/Zipper) |
| Auxiliary | [CS-ServerChan](https://github.com/lintstar/CS-ServerChan) | 通过 CobaltStike 服务端 / 客户端 挂载脚本,将上线主机信息通过 Server 酱通知到微信 | ![](https://img.shields.io/github/stars/lintstar/CS-ServerChan) | ![](https://img.shields.io/github/languages/top/lintstar/CS-ServerChan) |
| Auxiliary | [CS-PushPlus](https://github.com/lintstar/CS-PushPlus) | 使用免费且支持微信模板消息推送的 PushPlus 进行上线主机提醒 | ![](https://img.shields.io/github/stars/lintstar/CS-PushPlus) | ![](https://img.shields.io/github/languages/top/lintstar/CS-PushPlus) |
| Auxiliary | [HelpColor](https://github.com/outflanknl/HelpColor) | Aggressor script that lists available Cobalt Strike beacon commands and colors them based on their type | ![](https://img.shields.io/github/stars/outflanknl/HelpColor) | ![](https://img.shields.io/github/languages/top/outflanknl/HelpColor) |
| Auxiliary | [CobaltStrike Helpmsg CNA](https://github.com/lpBunny/cobaltstrike-helpmsg-cna) | This cna contains error messages for Win32 error codes, HRESULT defintions, and NTSTATUS definitions. This cna can be helpful for those operating out of linux/mac clients without access to the net.exe program, or as a quick way to looking hresult/ntstatus codes without having to do a google search. | ![](https://img.shields.io/github/stars/lpBunny/cobaltstrike-helpmsg-cna) | ![](https://img.shields.io/github/languages/top/lpBunny/cobaltstrike-helpmsg-cna) |
| Auxiliary | [YouMayPasser](https://github.com/waldo-irc/YouMayPasser) | Stable PeSieve Bypass and Stable Moneta Bypass. | ![](https://img.shields.io/github/stars/waldo-irc/YouMayPasser) | ![](https://img.shields.io/github/languages/top/waldo-irc/YouMayPasser) |
| Auxiliary | [Sync Downloads](https://github.com/EspressoCake/BeaconDownloadSync) | This is meant as a fine-tuned control mechanism for syncing files from the Cobalt Strike Downloads entries in the data model | ![](https://img.shields.io/github/stars/EspressoCake/BeaconDownloadSync) | ![](https://img.shields.io/github/languages/top/EspressoCake/BeaconDownloadSync) |
| Auxiliary | [Headless Strike](https://github.com/CodeXTF2/cobaltstrike-headless) | Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client. | ![](https://img.shields.io/github/stars/CodeXTF2/cobaltstrike-headless) | ![](https://img.shields.io/github/languages/top/CodeXTF2/cobaltstrike-headless) |
| Auxiliary | [Headless Strike](https://github.com/F3eev/SharkExec) | 内网渗透\红队工具\C#内存加载\cobaltstrike | ![](https://img.shields.io/github/stars/F3eev/SharkExec) | ![](https://img.shields.io/github/languages/top/F3eev/SharkExec) |
| Auxiliary | [Cohab_Processes](https://github.com/Octoberfest7/Cohab_Processes) | A small Aggressor script to help Red Teams identify foreign processes on a host machine | ![](https://img.shields.io/github/stars/Octoberfest7/Cohab_Processes) | ![](https://img.shields.io/github/languages/top/Octoberfest7/Cohab_Processes) |
| Auxiliary | [EnumStrike](https://github.com/DallasFR/EnumStrike) | Cobalt Strike Aggressor script to automate host and domain enumeration. | ![](https://img.shields.io/github/stars/DallasFR/EnumStrike) | ![](https://img.shields.io/github/languages/top/DallasFR/EnumStrike) |
| Synthesis | [AM0N-Eye](https://github.com/S3N4T0R-0X0/AMON-Eye) | AM0N-Eye is a compilation of a group of the most important scripts that were written specifically for Cobaltsetrike and the rest of the files such as de for modification in colors and images. | ![](https://img.shields.io/github/stars/S3N4T0R-0X0/AMON-Eye) | ![](https://img.shields.io/github/languages/top/S3N4T0R-0X0/AMON-Eye) |
| Synthesis | [aggressor_snippets](https://github.com/Octoberfest7/aggressor_snippets) | A collection of random small Aggressor snippets that don't warrant their own repo | ![](https://img.shields.io/github/stars/Octoberfest7/aggressor_snippets) | ![](https://img.shields.io/github/languages/top/Octoberfest7/aggressor_snippets) |
| Synthesis | [Erebus](https://github.com/DeEpinGh0st/Erebus) | CobaltStrike4.x --> Erebus CobaltStrike后渗透测试插件 | ![](https://img.shields.io/github/stars/DeEpinGh0st/Erebus) | ![](https://img.shields.io/github/languages/top/DeEpinGh0st/Erebus) |
| Synthesis | [CSplugins](https://github.com/SeaOf0/CSplugins) | CobaltStrike后渗透测试插件集合 | ![](https://img.shields.io/github/stars/SeaOf0/CSplugins) | ![](https://img.shields.io/github/languages/top/SeaOf0/CSplugins) |
| Synthesis | [Cobalt-Strike-Aggressor-Scripts](https://github.com/timwhitez/Cobalt-Strike-Aggressor-Scripts) | CobaltStrike后渗透测试插件集合 [Usage](https://github.com/timwhitez/Cobalt-Strike-Aggressor-Scripts/wiki/Usage) | ![](https://img.shields.io/github/stars/timwhitez/Cobalt-Strike-Aggressor-Scripts) | ![](https://img.shields.io/github/languages/top/timwhitez/Cobalt-Strike-Aggressor-Scripts) |
| Synthesis | [AggressorScripts](https://github.com/bluscreenofjeff/AggressorScripts) | Aggressor scripts for use with Cobalt Strike 3.0+ | ![](https://img.shields.io/github/stars/bluscreenofjeff/AggressorScripts) | ![](https://img.shields.io/github/languages/top/bluscreenofjeff/AggressorScripts) |
| Synthesis | [RedTeamTools](https://github.com/lengjibo/RedTeamTools) | RedTeamTools for use with Cobalt Strike | ![](https://img.shields.io/github/stars/lengjibo/RedTeamTools) | ![](https://img.shields.io/github/languages/top/lengjibo/RedTeamTools) |
| Synthesis | [cobalt-arsenal](https://github.com/mgeeky/cobalt-arsenal) |Aggressor Scripts for Cobalt Strike 4.0+ | ![](https://img.shields.io/github/stars/mgeeky/cobalt-arsenal) | ![](https://img.shields.io/github/languages/top/mgeeky/cobalt-arsenal) |
| Synthesis | [MoveKit](https://github.com/0xthirteen/MoveKit) |The aggressor script handles payload creation by reading the template files for a specific execution type. [intro](https://www.4hou.com/posts/jO1y) | ![](https://img.shields.io/github/stars/0xthirteen/MoveKit) | ![](https://img.shields.io/github/languages/top/0xthirteen/MoveKit) |
| Synthesis | [StayKit](https://github.com/0xthirteen/StayKit) |The aggressor script handles payload creation by reading the template files for a specific execution type. [intro](https://www.4hou.com/posts/jO1y) | ![](https://img.shields.io/github/stars/0xthirteen/StayKit) | ![](https://img.shields.io/github/languages/top/0xthirteen/StayKit) |
| Synthesis | [AggressorScripts](https://github.com/ramen0x3f/AggressorScripts) | AggressorScripts | ![](https://img.shields.io/github/stars/ramen0x3f/AggressorScripts) | ![](https://img.shields.io/github/languages/top/ramen0x3f/AggressorScripts) |
| Synthesis | [AggressorScripts](https://github.com/harleyQu1nn/AggressorScripts) | Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources | ![](https://img.shields.io/github/stars/harleyQu1nn/AggressorScripts) | ![](https://img.shields.io/github/languages/top/harleyQu1nn/AggressorScripts) |
| Synthesis | [AggressorScripts](https://github.com/ramen0x3f/AggressorScripts) | AggressorScripts | ![](https://img.shields.io/github/stars/ramen0x3f/AggressorScripts) | ![](https://img.shields.io/github/languages/top/ramen0x3f/AggressorScripts) |
| Synthesis | [Aggressor-VYSEC](https://github.com/vysecurity/Aggressor-VYSEC) | Contains a bunch of CobaltStrike Aggressor Scripts | ![](https://img.shields.io/github/stars/vysecurity/Aggressor-VYSEC) | ![](https://img.shields.io/github/languages/top/vysecurity/Aggressor-VYSEC) |
| Synthesis | [AggressorAssessor](https://github.com/FortyNorthSecurity/AggressorAssessor) | AggressorAssessor | ![](https://img.shields.io/github/stars/FortyNorthSecurity/AggressorAssessor) | ![](https://img.shields.io/github/languages/top/FortyNorthSecurity/AggressorAssessor) |
| Synthesis | [AggressorAssessor](https://github.com/FortyNorthSecurity/AggressorAssessor) | AggressorAssessor | ![](https://img.shields.io/github/stars/FortyNorthSecurity/AggressorAssessor) | ![](https://img.shields.io/github/languages/top/FortyNorthSecurity/AggressorAssessor) |
| Synthesis | [aggressor-scripts](https://github.com/threatexpress/aggressor-scripts) | Collection of Cobalt Strike Aggressor Scripts | ![](https://img.shields.io/github/stars/threatexpress/aggressor-scripts) | ![](https://img.shields.io/github/languages/top/threatexpress/aggressor-scripts) |
| Synthesis | [梼杌](https://github.com/pandasec888/taowu-cobalt-strike) | 基于cobalt strike平台的红队自动化框架 | ![](https://img.shields.io/github/stars/pandasec888/taowu-cobalt-strike) | ![](https://img.shields.io/github/languages/top/pandasec888/taowu-cobalt-strike) |
| Synthesis | [Aggressor-scripts](https://github.com/Und3rf10w/Aggressor-scripts) | This is just a random collection of Aggressor Scripts I've written for Cobalt Strike 3.x. (其中有一个debug脚本比较好用) | ![](https://img.shields.io/github/stars/Und3rf10w/Aggressor-scripts) | ![](https://img.shields.io/github/languages/top/Und3rf10w/Aggressor-scripts) |
| Synthesis | [Aggressor-Script](https://github.com/rasta-mouse/Aggressor-Script) | Collection of Aggressor Scripts for Cobalt Strike(主要包含了提权和权限维持脚本) | ![](https://img.shields.io/github/stars/rasta-mouse/Aggressor-Script) | ![](https://img.shields.io/github/languages/top/rasta-mouse/Aggressor-Script) |
| Synthesis | [Aggressor-Script](https://github.com/QAX-A-Team/CobaltStrike-Toolset) | Aggressor Script, Kit, Malleable C2 Profiles, External C2 and so on | ![](https://img.shields.io/github/stars/QAX-A-Team/CobaltStrike-Toolset) | ![](https://img.shields.io/github/languages/top/QAX-A-Team/CobaltStrike-Toolset) |
| Synthesis | [aggressor_scripts_collection](https://github.com/michalkoczwara/aggressor_scripts_collection) | Collection of various aggressor scripts for Cobalt Strike from awesome people. Will be sure to update this repo with credit to each person. | ![](https://img.shields.io/github/stars/michalkoczwara/aggressor_scripts_collection) | ![](https://img.shields.io/github/languages/top/michalkoczwara/aggressor_scripts_collection) |
| Synthesis | [CobaltStrike-ToolKit](https://github.com/killswitch-GUI/CobaltStrike-ToolKit) | googlesearch.profile and script related to AD. | ![](https://img.shields.io/github/stars/killswitch-GUI/CobaltStrike-ToolKit) | ![](https://img.shields.io/github/languages/top/killswitch-GUI/CobaltStrike-ToolKit) |
| Synthesis | [Arsenal](https://github.com/Cliov/Arsenal) | Cobalt Strike 3.13 Arsenal Kit | ![](https://img.shields.io/github/stars/Cliov/Arsenal) | ![](https://img.shields.io/github/languages/top/Cliov/Arsenal) |
| Synthesis | [cobalt-arsenal](https://github.com/mgeeky/cobalt-arsenal) | My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+ | ![](https://img.shields.io/github/stars/mgeeky/cobalt-arsenal) | ![](https://img.shields.io/github/languages/top/mgeeky/cobalt-arsenal) |
| Synthesis | [aggressor_scripts](https://github.com/001SPARTaN/aggressor_scripts) | A collection of useful scripts for Cobalt Strike.(powershell.cna;bot.cna;dcom_lateral_movement.cna;ElevateKit) | ![](https://img.shields.io/github/stars/001SPARTaN/aggressor_scripts) | ![](https://img.shields.io/github/languages/top/001SPARTaN/aggressor_scripts) |
| Synthesis | [aggressor](https://github.com/gaudard/scripts/tree/master/red-team/aggressor) | creating tunnels with netsh; changed default to bit.ly redirect to mcdonalds;using powershell to kill parent process; | ![](https://img.shields.io/github/stars/001SPARTaN/aggressor_scripts) | ![](https://img.shields.io/github/languages/top/001SPARTaN/aggressor_scripts) |
| Synthesis | [CobaltStrikeCNA](https://github.com/branthale/CobaltStrikeCNA) | A collection of scripts - from various sources - see script for more info. | ![](https://img.shields.io/github/stars/branthale/CobaltStrikeCNA) | ![](https://img.shields.io/github/languages/top/branthale/CobaltStrikeCNA) |
| Synthesis | [AggressorScripts](https://github.com/oldb00t/AggressorScripts) | Highlights selected processes from the ps command in beacon;Loads various aliases into beacon;sets a few defaults for scripts to be used later.. | ![](https://img.shields.io/github/stars/oldb00t/AggressorScripts) | ![](https://img.shields.io/github/languages/top/oldb00t/AggressorScripts) |
| Synthesis | [AggressorAssessor](https://github.com/FortyNorthSecurity/AggressorAssessor) | 从C2生成到横向移动的全辅助脚本套件 | ![](https://img.shields.io/github/stars/FortyNorthSecurity/AggressorAssessor) | ![](https://img.shields.io/github/languages/top/FortyNorthSecurity/AggressorAssessor) |
| Synthesis | [AggressorCollection](https://github.com/invokethreatguy/AggressorCollection) | Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors | ![](https://img.shields.io/github/stars/invokethreatguy/AggressorCollection) | ![](https://img.shields.io/github/languages/top/invokethreatguy/AggressorCollection) |
| Synthesis | [Cobaltstrike-Aggressor-Scripts-Collection](https://github.com/bytecod3r/Cobaltstrike-Aggressor-Scripts-Collection) | The collection of tested cobaltstrike aggressor scripts. | ![](https://img.shields.io/github/stars/bytecod3r/Cobaltstrike-Aggressor-Scripts-Collection) | ![](https://img.shields.io/github/languages/top/bytecod3r/Cobaltstrike-Aggressor-Scripts-Collection) |
| Synthesis | [aggressorScripts](https://github.com/Matrix20085/aggressorScripts) | CobaltStrike AggressorScripts for the lazy | ![](https://img.shields.io/github/stars/Matrix20085/aggressorScripts) | ![](https://img.shields.io/github/languages/top/Matrix20085/aggressorScripts) |
| Synthesis | [Aggressor_Scripts](https://github.com/EspressoCake/Aggressor_Scripts) | A compilation of Aggressor/Sleep scripts for operational purposes that I've made. | ![](https://img.shields.io/github/stars/EspressoCake/Aggressor_Scripts) | ![](https://img.shields.io/github/languages/top/EspressoCake/Aggressor_Scripts) |
| Synthesis | [cobalt_strike_extension_kit](https://github.com/josephkingstone/cobalt_strike_extension_kit) | 集成了SharpHound,SharpRDP,SharpWMI等在内的各种内网工具,使用AggressorScripts构建workflow | ![](https://img.shields.io/github/stars/josephkingstone/cobalt_strike_extension_kit) | ![](https://img.shields.io/github/languages/top/josephkingstone/cobalt_strike_extension_kit) |
| Synthesis | [cobaltstrike](https://github.com/wafinfo/cobaltstrike) | 具备域管理员定位、域信息收集、权限维持、内网扫描、数据库hash dump、Everything内网搜索文件等功能的插件集合 | ![](https://img.shields.io/github/stars/wafinfo/cobaltstrike) | ![](https://img.shields.io/github/languages/top/wafinfo/cobaltstrike) |
| Synthesis | [365CobaltStrike](https://github.com/0e0w/CobaltStrike) | 兼容CobaltStrike4.0的插件集合 | ![](https://img.shields.io/github/stars/0e0w/CobaltStrike) | ![](https://img.shields.io/github/languages/top/0e0w/CobaltStrike) |
| Synthesis | [Cobalt-Strike](https://github.com/Mikasazero/Cobalt-Strike) | 内容有横向移动、密码抓取、权限提升、权限维持等,尽可能将内网渗透中常用到的东西整理一下,方便使用 | ![](https://img.shields.io/github/stars/Mikasazero/Cobalt-Strike) | ![](https://img.shields.io/github/languages/top/Mikasazero/Cobalt-Strike) |
| Synthesis | [CSPlugins](https://github.com/Al1ex/CSPlugins) | 一个对Cobaltstrike第三方插件进行收集的项目,持续更新。 | ![](https://img.shields.io/github/stars/Al1ex/CSPlugins) | ![](https://img.shields.io/github/languages/top/Al1ex/CSPlugins) |
| Synthesis | [CobaltStrike-xor](https://github.com/WBGlIl/CobaltStrike-file) | third-party --> vnc_x86_dll and vnc_x64_dll | ![](https://img.shields.io/github/stars/WBGlIl/CobaltStrike-file) | ![](https://img.shields.io/github/languages/top/WBGlIl/CobaltStrike-file) |
| Synthesis | [Z1-AggressorScripts](https://github.com/z1un/Z1-AggressorScripts) | 适用于Cobalt Strike 3.x & 4.x 的内网渗透插件集合 | ![](https://img.shields.io/github/stars/z1un/Z1-AggressorScripts) | ![](https://img.shields.io/github/languages/top/z1un/Z1-AggressorScripts) |
| Synthesis | [csplugin](https://github.com/422926799/csplugin) | 导入PowerView脚本,和常见的功能使用 | ![](https://img.shields.io/github/stars/422926799/csplugin) | ![](https://img.shields.io/github/languages/top/422926799/csplugin) |
| Synthesis | [CSplugins](https://github.com/SeaOf0/CSplugins) | 涉及工作目录、信息收集、凭据获取、权限维持、权限提升、用户相关、RDP相关、防火墙相关、域渗透、powershell相关、内网穿透、内网探测、远程文件下载、痕迹清除的综合型插件系统 | ![](https://img.shields.io/github/stars/SeaOf0/CSplugins) | ![](https://img.shields.io/github/languages/top/SeaOf0/CSplugins) |
| Synthesis | [LSTAR](https://github.com/lintstar/LSTAR) | 本着简化 CS 右键和方便自己集成的目的,对 Reference 里的项目进行了缝合以及二次开 (抄) 发 (袭)并添加了虚拟机/AV 检测、主机相关密码抓取、 Cxk 限时免杀的 Mimikatz 和 Adduser 等功能 | ![](https://img.shields.io/github/stars/lintstar/LSTAR) | ![](https://img.shields.io/github/languages/top/lintstar/LSTAR) |
| Synthesis | [SharpUtils](https://github.com/breakid/SharpUtils) | A collection of C# utilities intended to be used with Cobalt Strike's execute-assembly. | ![](https://img.shields.io/github/stars/breakid/SharpUtils) | ![](https://img.shields.io/github/languages/top/breakid/SharpUtils) |
| Synthesis | [SharpToolsAggressor](https://github.com/uknowsec/SharpToolsAggressor) | 内网渗透中常用的c#程序整合成cs脚本,直接内存加载。持续更新~ | ![](https://img.shields.io/github/stars/uknowsec/SharpToolsAggressor) | ![](https://img.shields.io/github/languages/top/uknowsec/SharpToolsAggressor) |
| Synthesis | [C.Ex](https://github.com/Sifter-Ex/cPlug) | CobaltStrike Plugin to start and utilize Cobalt Strike (locally or remotely) from within Sifter | ![](https://img.shields.io/github/stars/Sifter-Ex/cPlug) | ![](https://img.shields.io/github/languages/top/Sifter-Ex/cPlug) |
| Synthesis | [OLa](https://github.com/d3ckx1/OLa) | 一款CS后渗透模块插件,让大家使用一款插件就够了,本插件集大家之所长 | ![](https://img.shields.io/github/stars/d3ckx1/OLa) | ![](https://img.shields.io/github/languages/top/d3ckx1/OLa) |### 0x05 Related Tools
| Type | Name | Description | Popularity | Language |
|:---:|:---:|:---:|:---:|:---:|
| AntiCobaltStrike | [cobaltstrike_brute](https://github.com/isafe/cobaltstrike_brute) | Cobalt Strike Team Server Password Brute Forcer | ![](https://img.shields.io/github/stars/isafe/cobaltstrike_brute) | ![](https://img.shields.io/github/languages/top/isafe/cobaltstrike_brute) |
| AntiCobaltStrike | [Dissecting Cobalt Strike using Python](https://github.com/fox-it/dissect.cobaltstrike) | dissect.cobaltstrike is a Python library for dissecting and parsing Cobalt Strike related data such as beacon payloads and Malleable C2 Profiles. | ![](https://img.shields.io/github/stars/fox-it/dissect.cobaltstrike) | ![](https://img.shields.io/github/languages/top/fox-it/dissect.cobaltstrike) |
| AntiCobaltStrike | [CobaltSpam](https://github.com/hariomenkel/CobaltSpam) | Cobalt Strike Team Server Password Brute Forcer | ![](https://img.shields.io/github/stars/hariomenkel/CobaltSpam) | ![](https://img.shields.io/github/languages/top/hariomenkel/CobaltSpam) |
| AntiCobaltStrike | [CobaltStrikeDos](https://github.com/JamVayne/CobaltStrikeDos) | CVE-2021-36798 Exp: Cobalt Strike < 4.4 Dos | ![](https://img.shields.io/github/stars/JamVayne/CobaltStrikeDos) | ![](https://img.shields.io/github/languages/top/JamVayne/CobaltStrikeDos) |
| AntiCobaltStrike | [CS_mock](https://github.com/burpheart/CS_mock) | 模拟cobalt strike beacon上线包 | ![](https://img.shields.io/github/stars/burpheart/CS_mock) | ![](https://img.shields.io/github/languages/top/burpheart/CS_mock) |
| AntiCobaltStrike | [CS_fakesubmit](https://github.com/LiAoRJ/CS_fakesubmit) | 一个可以伪装上线Cobaltstrike的脚本 | ![](https://img.shields.io/github/stars/burpheart/CS_mock) | ![](https://img.shields.io/github/languages/top/LiAoRJ/CS_fakesubmit) |
| AntiCobaltStrike | [CobaltStrikeScan](https://github.com/LiAoRJ/CS_fakesubmit) | Scan files or process memory for Cobalt Strike beacons and parse their configuration. | ![](https://img.shields.io/github/stars/Apr4h/CobaltStrikeScan) | ![](https://img.shields.io/github/languages/top/Apr4h/CobaltStrikeScan) |
| AntiCobaltStrike | [grab_beacon_config](https://github.com/whickey-r7/grab_beacon_config) | Simple PoC script to scan and acquire CobaltStrike Beacon configurations. | ![](https://img.shields.io/github/stars/whickey-r7/grab_beacon_config) | ![](https://img.shields.io/github/languages/top/whickey-r7/grab_beacon_config) |
| AntiCobaltStrike | [C2-JARM](https://github.com/cedowens/C2-JARM) | 通过ssl实现所产生的JARM hash来识别不同的c2,例如CobaltStrike | ![](https://img.shields.io/github/stars/cedowens/C2-JARM) | ![](https://img.shields.io/github/languages/top/cedowens/C2-JARM) |
| AntiCobaltStrike | [JARM](https://github.com/salesforce/jarm) | JARM fingerprints scanner | ![](https://img.shields.io/github/stars/salesforce/jarm) | ![](https://img.shields.io/github/languages/top/salesforce/jarm) |
| AntiCobaltStrike | [DetectCobaltStomp](https://github.com/slaeryan/DetectCobaltStomp) | A quick(and perhaps dirty!) PoC tool to detect Module Stomping as implemented by Cobalt Strike with moderate to high confidence | ![](https://img.shields.io/github/stars/slaeryan/DetectCobaltStomp) | ![](https://img.shields.io/github/languages/top/slaeryan/DetectCobaltStomp) |
| AntiCobaltStrike | [cobaltstrike](https://github.com/Te-k/cobaltstrike) | Code and yara rules to detect and analyze Cobalt Strike | ![](https://img.shields.io/github/stars/Te-k/cobaltstrike) | ![](https://img.shields.io/github/languages/top/Te-k/cobaltstrike) |
| AntiCobaltStrike | [CS_Decrypt](https://github.com/WBGlIl/CS_Decrypt) | 解密可以帮助你理解cs beacon通信原理,但注意密钥是在本地teamserver中 | ![](https://img.shields.io/github/stars/WBGlIl/CS_Decrypt) | ![](https://img.shields.io/github/languages/top/WBGlIl/CS_Decrypt) |
| AntiCobaltStrike | [CS Scripts](https://github.com/Skactor/cs-scripts) | parse_beacon_keys.py 对 .cobaltstrike.beacon_keys 文件的解析工具 | ![](https://img.shields.io/github/stars/Skactor/cs-scripts) | ![](https://img.shields.io/github/languages/top/Skactor/cs-scripts) |
| AntiCobaltStrike | [PyBeacon](https://github.com/nccgroup/pybeacon) | A collection of scripts for dealing with Cobalt Strike beacons in Python Resources | ![](https://img.shields.io/github/stars/nccgroup/pybeacon) | ![](https://img.shields.io/github/languages/top/nccgroup/pybeacon) |
| AntiCobaltStrike | [cobaltstrikescan](https://github.com/JPCERTCC/aa-tools/blob/master/cobaltstrikescan.py) | Detecting CobaltStrike for Volatility | ![](https://img.shields.io/github/stars/JPCERTCC/aa-tools) | ![](https://img.shields.io/github/languages/top/JPCERTCC/aa-tools) |
| AntiCobaltStrike | [CobaltStrikeForensic](https://github.com/RomanEmelyanov/CobaltStrikeForensic) | Toolset for research malware and Cobalt Strike beacons | ![](https://img.shields.io/github/stars/RomanEmelyanov/CobaltStrikeForensic) | ![](https://img.shields.io/github/languages/top/RomanEmelyanov/CobaltStrikeForensic) |
| AntiCobaltStrike | [DuckMemoryScan](https://github.com/huoji120/DuckMemoryScan) | A simple tool to find backdoors including but not limited to iis hijacking, fileless Trojan, bypass AV shellcode. | ![](https://img.shields.io/github/stars/huoji120/DuckMemoryScan) | ![](https://img.shields.io/github/languages/top/huoji120/DuckMemoryScan) |
| AntiCobaltStrike | [CobaltSplunk Splunk Application](https://github.com/vysecurity/CobaltSplunk) | CobaltSplunk is a Splunk Application that knows how to 1) ingest Cobalt Strike related logs and parse them properly, 2) display useful operational dashboards, 3) display relevant reports. | ![](https://img.shields.io/github/stars/vysecurity/CobaltSplunk) | ![](https://img.shields.io/github/languages/top/vysecurity/CobaltSplunk) |
| AntiCobaltStrike | [BeaconHunter](https://github.com/3lp4tr0n/BeaconHunter) | Behavior based monitoring and hunting tool built in C# tool leveraging ETW tracing. Blue teamers can use this tool to detect and respond to potential Cobalt Strike beacons. Red teamers can use this tool to research ETW bypasses and discover new processes that behave like beacons. | ![](https://img.shields.io/github/stars/3lp4tr0n/BeaconHunter) | ![](https://img.shields.io/github/languages/top/3lp4tr0n/BeaconHunter) |
| AntiCobaltStrike | [CobaltStrikeDetected](https://github.com/huoji120/CobaltStrikeDetected) | 40行代码检测到大部分CobaltStrike的shellcode | ![](https://img.shields.io/github/stars/huoji120/CobaltStrikeDetected) | ![](https://img.shields.io/github/languages/top/huoji120/CobaltStrikeDetected) |
| AntiCobaltStrike | [BeaconEye](https://github.com/CCob/BeaconEye) | Hunts out CobaltStrike beacons and logs operator command output | ![](https://img.shields.io/github/stars/CCob/BeaconEye) | ![](https://img.shields.io/github/languages/top/CCob/BeaconEye) |
| AntiCobaltStrike | [Beacon_re](https://github.com/WBGlIl/Beacon_re) | cobalt strike beacon代码还原 | ![](https://img.shields.io/github/stars/WBGlIl/Beacon_re) | ![](https://img.shields.io/github/languages/top/WBGlIl/Beacon_re) |
| AntiCobaltStrike | [Beacon.dll](https://github.com/NoOne-hub/Beacon.dll) | cobalt strike beacon实现 | ![](https://img.shields.io/github/stars/NoOne-hub/Beacon.dll) | ![](https://img.shields.io/github/languages/top/NoOne-hub/Beacon.dll) |
| AntiCobaltStrike | [SharpBeacon](https://github.com/t0mca/SharpBeacon) | cobalt strike beacon csharp实现 | ![](https://img.shields.io/github/stars/t0mca/SharpBeacon) | ![](https://img.shields.io/github/languages/top/t0mca/SharpBeacon) |
| AntiCobaltStrike | [EvilEye](https://github.com/akkuman/EvilEye) | EvilEye is a BeaconEye implement in Golang. | ![](https://img.shields.io/github/stars/akkuman/EvilEye) | ![](https://img.shields.io/github/languages/top/akkuman/EvilEye) |
| AntiCobaltStrike | [Hunt-Sleeping-Beacons](https://github.com/akkuman/EvilEye) | The idea of this project is to identify beacons which are unpacked at runtime or running in the context of another process (=InMemory malware).. | ![](https://img.shields.io/github/stars/thefLink/Hunt-Sleeping-Beacons) | ![](https://img.shields.io/github/languages/top/thefLink/Hunt-Sleeping-Beacons) |
| AntiCobaltStrike | [CSRouge](https://github.com/Firebasky/CSRouge) | 恶意的CS服务器,只能urldns | ![](https://img.shields.io/github/stars/Firebasky/CSRouge) | ![](https://img.shields.io/github/languages/top/Firebasky/CSRouge) |
| AntiCobaltStrike | [Cobalt Strike Discovery](https://github.com/eremit4/cs-discovery) | Finds Cobalt Strike fingerprint on targets via traffic telemetry | ![](https://img.shields.io/github/stars/eremit4/cs-discovery) | ![](https://img.shields.io/github/languages/top/eremit4/cs-discovery) |
| Anti-AntiCobaltStrike | [bypass-beacon-config-scan](https://github.com/qigpig/bypass-beacon-config-scan) | Bypass cobaltstrike beacon config scan for 4.1 | ![](https://img.shields.io/github/stars/qigpig/bypass-beacon-config-scan) | ![](https://img.shields.io/github/languages/top/qigpig/bypass-beacon-config-scan) |
| Anti-AntiCobaltStrike | [bypass-beacon-config-scan](https://github.com/lovechoudoufu/GoogleCSAgent_cdf) | CSAgent 与 GoogleAuth 的缝合体,cobalt strike4.4版本的破解+otp动态口令的agent | ![](https://img.shields.io/github/stars/lovechoudoufu/GoogleCSAgent_cdf) | ![](https://img.shields.io/github/languages/top/lovechoudoufu/GoogleCSAgent_cdf) |
| BypassAV | [Cooolis-ms](https://github.com/Rvn0xsy/Cooolis-ms) | Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码,帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。 | ![](https://img.shields.io/github/stars/Rvn0xsy/Cooolis-ms) | ![](https://img.shields.io/github/languages/top/Rvn0xsy/Cooolis-ms) |
| BypassAV | [UrbanBishopLocal](https://github.com/slyd0g/UrbanBishopLocal) | A port of FuzzySecurity's [UrbanBishop](https://github.com/FuzzySecurity/Sharp-Suite#urbanbishop) project for inline shellcode execution. | ![](https://img.shields.io/github/stars/slyd0g/UrbanBishopLocal) | ![](https://img.shields.io/github/languages/top/slyd0g/UrbanBishopLocal) |
| BypassAV | [ShellcodeLoader](https://github.com/ByPassAVTeam/ShellcodeLoader) | Windows通用免杀shellcode加载器 | ![](https://img.shields.io/github/stars/ByPassAVTeam/ShellcodeLoader) | ![](https://img.shields.io/github/languages/top/ByPassAVTeam/ShellcodeLoader) |
| BypassAV | [ZheTian](https://github.com/yqcs/ZheTian) | 免杀shellcode加载框架 | ![](https://img.shields.io/github/stars/yqcs/ZheTian) | ![](https://img.shields.io/github/languages/top/yqcs/ZheTian) |
| BypassAV | [EXOCET](https://github.com/tanc7/EXOCET-AV-Evasion) | AV-evading, undetectable, payload delivery tool | ![](https://img.shields.io/github/stars/tanc7/EXOCET-AV-Evasion) | ![](https://img.shields.io/github/languages/top/tanc7/EXOCET-AV-Evasion) |
| BypassAV | [SecondaryDevCobaltStrike](https://github.com/Yang0615777/SecondaryDevCobaltStrike) | CobaltStrike after second development, can bypass Kaspersky, Norton, McAfee, etc. | ![](https://img.shields.io/github/stars/Yang0615777/SecondaryDevCobaltStrike) | ![](https://img.shields.io/github/languages/top/slyd0g/UrbanBishopLocalYang0615777/SecondaryDevCobaltStrike) |
| BypassAV | [Bypass_Go](https://github.com/metaStor/Bypass_Go) | 参考CS的Bypass插件+分离免杀思想改造 | ![](https://img.shields.io/github/stars/metaStor/Bypass_Go) | ![](https://img.shields.io/github/languages/top/slyd0g/metaStor/Bypass_Go) |
| BypassAV | [CrossNet-Beta](https://github.com/dr0op/CrossNet-Beta) | In the red team operation, the phishing executable file is generated by using the white utilization, to bypass AV and automatically judging the network environment. can bypass 360 and huorong | ![](https://img.shields.io/github/stars/dr0op/CrossNet-Beta) | ![](https://img.shields.io/github/languages/top/dr0op/CrossNet-Beta) |
| BypassAV | [EVA](https://github.com/ORCA666/EVA) | FUD shellcode Injector | ![](https://img.shields.io/github/stars/ORCA666/EVA) | ![](https://img.shields.io/github/languages/top/ORCA666/EVA) |
| BypassAV | [BypassAV](https://github.com/hack2fun/BypassAV) | 用golang来打包生成后门,具备一定的免杀能力 | ![](https://img.shields.io/github/stars/hack2fun/BypassAV) | ![](https://img.shields.io/github/languages/top/hack2fun/BypassAV) |
| BypassAV | [NimShellCodeLoader](https://github.com/aeverj/NimShellCodeLoader) | Nim编写Windows平台shellcode免杀加载器 | ![](https://img.shields.io/github/stars/aeverj/NimShellCodeLoader) | ![](https://img.shields.io/github/languages/top/aeverj/NimShellCodeLoader) |
| BypassAV | [beacon_hook_bypass_memscan](https://github.com/zu1k/beacon_hook_bypass_memscan) | cs bypass卡巴斯基内存查杀: https://xz.aliyun.com/t/9399 | ![](https://img.shields.io/github/stars/zu1k/beacon_hook_bypass_memscan) | ![](https://img.shields.io/github/languages/top/zu1k/beacon_hook_bypass_memscan) |
| BypassAV | [ZheTian](https://github.com/yqcs/ZheTian) | ZheTian Powerful remote load and execute ShellCode tool | ![](https://img.shields.io/github/stars/yqcs/ZheTian) | ![](https://img.shields.io/github/languages/top/yqcs/ZheTian) |
| BypassAV | [bypassAV](https://github.com/b1ank1108/bypassAV) | 破产版免杀,大致思路是将shellcode异或,之后在主程序中解码。 关键是清除一些符号信息 | ![](https://img.shields.io/github/stars/b1ank1108/bypassAV) | ![](https://img.shields.io/github/languages/top/b1ank1108/bypassAV) |
| BypassAV | [JsLoader](https://github.com/Hzllaga/JsLoader) | 免杀shellcode并绕过杀毒添加自启动 | ![](https://img.shields.io/github/stars/Hzllaga/JsLoader) | ![](https://img.shields.io/github/languages/top/Hzllaga/JsLoader) |
| BypassAV | [ShellcodeLoader](https://github.com/Hzllaga/ShellcodeLoader) | 将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术。 | ![](https://img.shields.io/github/stars/Hzllaga/ShellcodeLoader) | ![](https://img.shields.io/github/languages/top/Hzllaga/ShellcodeLoader) |
| BypassAV | [Alt-Beacon-Payload](https://github.com/xx0hcd/Alt-Beacon-Payload) | Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github.com/RCStep/CSSG.(可以给他补充一个cna一键配置脚本) | ![](https://img.shields.io/github/stars/xx0hcd/Alt-Beacon-Payload) | ![](https://img.shields.io/github/languages/top/xx0hcd/Alt-Beacon-Payload) |
| BypassAV | [SigFlip](https://github.com/med0x2e/SigFlip) | SigFlip是一款用于修补有签名的PE文件(exe、dll、sys等)的工具,它不会影响或破坏现有的签名,换句话说,你可以通过嵌入数据(即shellcode)来改变PE文件的校验和/哈希值,而不会破坏文件签名、完整性检查或PE文件功能。 | ![](https://img.shields.io/github/stars/med0x2e/SigFlip) | ![](https://img.shields.io/github/languages/top/med0x2e/SigFlip) |
| BypassAV | [SigFlip](https://github.com/akkuman/gSigFlip) | SigFlip是一款用于修补有签名的PE文件(exe、dll、sys等)的工具,它不会影响或破坏现有的签名,换句话说,你可以通过嵌入数据(即shellcode)来改变PE文件的校验和/哈希值,而不会破坏文件签名、完整性检查或PE文件功能。这是他的golang实现 | ![](https://img.shields.io/github/stars/akkuman/gSigFlip) | ![](https://img.shields.io/github/languages/top/akkuman/gSigFlip) |
| BypassAV | [Shellcode Fluctuation PoC](https://github.com/mgeeky/ShellcodeFluctuation) | 一个内存规避技术的PoC,循环地加密和解密shellcode的内容,然后使它在RW(或NoAccess)和RX内存保护之间波动。当我们的shellcode驻留在RW或NoAccess内存页时,像Moneta或pe-sieve这样的扫描器将无法追踪它并转储它以进行进一步分析。 | ![](https://img.shields.io/github/stars/mgeeky/ShellcodeFluctuation) | ![](https://img.shields.io/github/languages/top/mgeeky/ShellcodeFluctuation) |
| BypassAV | [cool](https://github.com/Ed1s0nZ/cool) | Golang-Gin 框架写的免杀平台,内置分离、捆绑等多种BypassAV方式。 | ![](https://img.shields.io/github/stars/Ed1s0nZ/cool) | ![](https://img.shields.io/github/languages/top/Ed1s0nZ/cool) |
| BypassAV | [ThreadStackSpoofer](https://github.com/mgeeky/ThreadStackSpoofer) | Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation from scanners and | ![](https://img.shields.io/github/stars/mgeeky/ThreadStackSpoofer) | ![](https://img.shields.io/github/languages/top/mgeeky/ThreadStackSpoofer) |
| BypassAV | [SleepyCrypt](https://github.com/SolomonSklash/SleepyCrypt) | A shellcode function to encrypt a running process image in memory when sleeping. | ![](https://img.shields.io/github/stars/SolomonSklash/SleepyCrypt) | ![](https://img.shields.io/github/languages/top/SolomonSklash/SleepyCrypt) |
| BypassAV | [GobypassAV](https://github.com/Pizz33/GobypassAV-shellcode) |免杀shellcode加载器,使用go实现,免杀bypass火绒、360、核晶、def等主流杀软. | ![](https://img.shields.io/github/stars/Pizz33/GobypassAV-shellcode) | ![](https://img.shields.io/github/languages/top/Pizz33/GobypassAV-shellcode) |
| BypassAV | [AtomLdr](https://github.com/NUL0x4C/AtomLdr) | A DLL loader with evasive features. | ![](https://img.shields.io/github/stars/NUL0x4C/AtomLdr) | ![](https://img.shields.io/github/languages/top/NUL0x4C/AtomLdr) |
| Analysis | [Beacon](https://github.com/SecIdiot/Beacon) | Open Source Cobalt Strike Beacon. Unreleased, in research stages | ![](https://img.shields.io/github/stars/SecIdiot/Beacon) | ![](https://img.shields.io/github/languages/top/SecIdiot/Beacon) |
| Analysis | [Linco2](https://github.com/Rvn0xsy/Linco2) | 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2,客户端可以通过curl就能下发Beacon任务。 | ![](https://img.shields.io/github/stars/Rvn0xsy/Linco2) | ![](https://img.shields.io/github/languages/top/Rvn0xsy/Linco2) |
| Analysis | [beacon-object-files](https://github.com/sk3w/beacon-object-files) | This repository contains miscellaneous examples of Cobalt Strike Beacon object file extensions. | ![](https://img.shields.io/github/stars/sk3w/beacon-object-files) | ![](https://img.shields.io/github/languages/top/sk3w/beacon-object-files) |
| Auxiliary | [C2ReverseProxy](https://github.com/Daybr4ak/C2ReverseProxy) | When you encounter a non-networked environment during penetration, you can use this tool to establish a reverse proxy channel so that the beacons generated by CobaltStrike can bounce back to the CobaltStrike server. | ![](https://img.shields.io/github/stars/Daybr4ak/C2ReverseProxy) | ![](https://img.shields.io/github/languages/top/Daybr4ak/C2ReverseProxy) |
| Auxiliary | [Cobalt strike custom 404 page](https://github.com/Ridter/cs_custom_404) | You can find the CS service through 404 pages. | ![](https://img.shields.io/github/stars/Ridter/cs_custom_404) | ![](https://img.shields.io/github/languages/top/Ridter/cs_custom_404) |
| Auxiliary | [StageStrike](https://github.com/RedXRanger/StageStrike) | A custom Cobalt Strike stager written in C.. is how the project started. | ![](https://img.shields.io/github/stars/RedXRanger/StageStrike) | ![](https://img.shields.io/github/languages/top/RedXRanger/StageStrike) |
| Auxiliary | [CS_SSLGen](https://github.com/tmcmil/cs-ssl-gen) | sslgen will install a letsencrypt certificate and create a Cobalt Strike keystore from it. | ![](https://img.shields.io/github/stars/tmcmil/cs-ssl-gen) | ![](https://img.shields.io/github/languages/top/tmcmil/cs-ssl-gen) |
| Auxiliary | [CobaltPatch](https://github.com/ASkyeye/CobaltPatch) | Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be Appended In Stage / Post-Ex Blocks. Made for C Programmers | ![](https://img.shields.io/github/stars/ASkyeye/CobaltPatch) | ![](https://img.shields.io/github/languages/top/ASkyeye/CobaltPatch) |
| Auxiliary | [pycobalt](https://github.com/dcsync/pycobalt) | Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be Appended In Stage / Post-Ex Blocks. Made for C Programmers. | ![](https://img.shields.io/github/stars/dcsync/pycobalt) | ![](https://img.shields.io/github/languages/top/dcsync/pycobalt) |
| Auxiliary | [redshell](https://github.com/Verizon/redshell) | An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server. | ![](https://img.shields.io/github/stars/Verizon/redshell) | ![](https://img.shields.io/github/languages/top/Verizon/redshell) |
| Auxiliary | [CobaltStrikeToGhostWriter](https://github.com/hausec/CobaltStrikeToGhostWriter) | Log converter from CS logs to a CSV in Ghostwriter's operation log format. | ![](https://img.shields.io/github/stars/hausec/CobaltStrikeToGhostWriter) | ![](https://img.shields.io/github/languages/top/hausec/CobaltStrikeToGhostWriter) |
| Auxiliary | [Ansible-Cobalt-Strike](https://github.com/jfmaes/Ansible-Cobalt-Strike) | An Ansible role to install cobalt-strike on debian based architectures, let's be honest it's for kali. | ![](https://img.shields.io/github/stars/jfmaes/Ansible-Cobalt-Strike) | ![](https://img.shields.io/github/languages/top/jfmaes/Ansible-Cobalt-Strike) |
| Auxiliary | [cobaltstrike_runtimeconfig](https://gist.github.com/xpn/6c40d620607e97c2a09c70032d32d278) | A POC showing how to modify Cobalt Strike beacon at runtime | ![](https://img.shields.io/github/stars/xpn/6c40d620607e97c2a09c70032d32d278) | ![](https://img.shields.io/github/languages/top/xpn/6c40d620607e97c2a09c70032d32d278) |
| Auxiliary | [pystinger](https://github.com/FunnyWolf/pystinger) | Pystinger implements SOCK4 proxy and port mapping through webshell. It can be directly used by cobalt strike for session online. | ![](https://img.shields.io/github/stars/FunnyWolf/pystinger) | ![](https://img.shields.io/github/languages/top/FunnyWolf/pystinger) |
| Auxiliary | [ansible-role-cobalt-strike](https://github.com/cisagov/ansible-role-cobalt-strike) | An Ansible role for installing Cobalt Strike. | ![](https://img.shields.io/github/stars/cisagov/ansible-role-cobalt-strike) | ![](https://img.shields.io/github/languages/top/cisagov/ansible-role-cobalt-strike) |
| Auxiliary | [CrossNet](https://github.com/dr0op/CrossNet-Beta) | In the red team operation, the phishing executable file is generated by using the white utilization, avoiding killing and automatically judging the network environment. | ![](https://img.shields.io/github/stars/dr0op/CrossNet-Beta) | ![](https://img.shields.io/github/languages/top/dr0op/CrossNet-Beta) |
| Auxiliary | [CrossC2-C2Profile](https://github.com/Richard-Tang/CrossC2-C2Profile) | CrossC2通信协议API实现,可兼容使用C2Profile | ![](https://img.shields.io/github/stars/Richard-Tang/CrossC2-C2Profile) | ![](https://img.shields.io/github/languages/top/Richard-Tang/CrossC2-C2Profile) |
| Auxiliary | [BypassAddUser](https://github.com/TryA9ain/BypassAddUser) | Bypass AV to add users | ![](https://img.shields.io/github/stars/TryA9ain/BypassAddUser) | ![](https://img.shields.io/github/languages/top/TryA9ain/BypassAddUser) |
| Auxiliary | [Docker-CobaltStrike](https://github.com/XRSec/Docker-CobaltStrike) | The tool covers almost all the technical links needed in the apt attack chain. Use cloud functions to avoid traceability Using docker container is fast and convenient Use the python script I wrote to avoid privacy disclosure and malicious attacks | ![](https://img.shields.io/github/stars/XRSec/Docker-CobaltStrike) | ![](https://img.shields.io/github/languages/top/XRSec/Docker-CobaltStrike) |
| Auxiliary | [TeamServer.prop](https://github.com/Cobalt-Strike/teamserver-prop) | TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot and keylog callback data, which allows you to tweak the fix for the “HotCobalt” vulnerability. This repository contains an example file that contains the default settings. | ![](https://img.shields.io/github/stars/Cobalt-Strike/teamserver-prop) | ![](https://img.shields.io/github/languages/top/Cobalt-Strike/teamserver-prop) |
| Auxiliary | [Cobalt_Strike_Ansible](https://github.com/EspressoCake/Cobalt_Strike_Ansible) | Cobalt Strike Ansible Deployment Guide (自动化部署与管理) | ![](https://img.shields.io/github/stars/EspressoCake/Cobalt_Strike_Ansible) | ![](https://img.shields.io/github/languages/top/EspressoCake/Cobalt_Strike_Ansible) |
| Auxiliary | [Ansible Role: Cobalt Strike](https://github.com/chryzsh/ansible-role-cobalt-strike) | Ansible Role: Cobalt Strike (自动化部署与管理) | ![](https://img.shields.io/github/stars/chryzsh/ansible-role-cobalt-strike) | ![](https://img.shields.io/github/languages/top/chryzsh/ansible-role-cobalt-strike) |
| Auxiliary | [csOnvps](https://github.com/AlphabugX/csOnvps) | cobaltstrike4.4 自动化执行teamserver,快速临时开启Teamserver脚本。 | ![](https://img.shields.io/github/stars/AlphabugX/csOnvps) | ![](https://img.shields.io/github/languages/top/AlphabugX/csOnvps) |
| Auxiliary | [Cobalt Strike Sleep Python Bridge](https://github.com/Cobalt-Strike/sleep_python_bridge) | This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python without the need for for the standard GUI client. | ![](https://img.shields.io/github/stars/Cobalt-Strike/sleep_python_bridge) | ![](https://img.shields.io/github/languages/top/Cobalt-Strike/sleep_python_bridge) |
| Auxiliary | [c2_reporter](https://github.com/tevora-threat/c2_reporter) | Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials | ![](https://img.shields.io/github/stars/tevora-threat/c2_reporter) | ![](https://img.shields.io/github/languages/top/tevora-threat/c2_reporter) |
| Auxiliary | [Cobalt Strike Beacon Dataset](https://github.com/fox-it/cobaltstrike-beacon-data) | Open Dataset of Cobalt Strike Beacon metadata (2018-2022) | ![](https://img.shields.io/github/stars/fox-it/cobaltstrike-beacon-data) | ![](https://img.shields.io/github/languages/top/fox-it/cobaltstrike-beacon-data) |
| Auxiliary | [Dumpert](https://github.com/outflanknl/Dumpert) | Dumpert, an LSASS memory dumper using direct system calls and API unhooking | ![](https://img.shields.io/github/stars/outflanknl/Dumpert) | ![](https://img.shields.io/github/languages/top/outflanknl/Dumpert) |
| Auxiliary | [DuplicateDump](https://github.com/Hagrid29/DuplicateDump) | Dumping LSASS with a duplicated handle from custom LSA plugin | ![](https://img.shields.io/github/stars/Hagrid29/DuplicateDump) | ![](https://img.shields.io/github/languages/top/Hagrid29/DuplicateDump) |
| Auxiliary | [BOFHound](https://github.com/fortalice/bofhound) | Generate BloodHound compatible JSON from logs written by ldapsearch BOF and pyldapsearch | ![](https://img.shields.io/github/stars/Hagrid29/DuplicateDump) | ![](https://img.shields.io/github/languages/top/Hagrid29/DuplicateDump) |
| Auxiliary | [PersistAssist](https://github.com/FortyNorthSecurity/PersistAssist) | PersistAssist is a fully modular persistence framework written in C#. All persistence techniques contain a cleanup method which will server to remove the persistence aside from the persistence code. | ![](https://img.shields.io/github/stars/FortyNorthSecurity/PersistAssist) | ![](https://img.shields.io/github/languages/top/FortyNorthSecurity/PersistAssist) |
| Auxiliary | [ElusiveMice](https://github.com/mgeeky/ElusiveMice) | Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind | ![](https://img.shields.io/github/stars/mgeeky/ElusiveMice) | ![](https://img.shields.io/github/languages/top/mgeeky/ElusiveMice) |
| Phishing | [GoFileBinder](https://github.com/inspiringz/GoFileBinder) | A builder 🔨 for binding evil program 😈 and normal document 🐣 | ![](https://img.shields.io/github/stars/inspiringz/GoFileBinder) | ![](https://img.shields.io/github/languages/top/inspiringz/GoFileBinder) |
| Synthesis | [geacon](https://github.com/darkr4y/geacon) | Using Go to implement CobaltStrike's Beacon | ![](https://img.shields.io/github/stars/darkr4y/geacon) | ![](https://img.shields.io/github/languages/top/darkr4y/geacon) |
| Synthesis | [geacon](https://github.com/TryHello/edit-gencon) | geacon:简单适配了一个profile配置文件,可直接拿来修改使用,用于cs上线linux. | ![](https://img.shields.io/github/stars/TryHello/edit-gencon) | ![](https://img.shields.io/github/languages/top/TryHello/edit-gencon) |
| Synthesis | [redi](https://github.com/taherio/redi) | Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt) | ![](https://img.shields.io/github/stars/taherio/redi) | ![](https://img.shields.io/github/languages/top/taherio/redi) |
| Synthesis | [cs2modrewrite](https://github.com/threatexpress/cs2modrewrite) | Automatically Generate Rulesets for Apache mod_rewrite or Nginx for Intelligent HTTP C2 Redirection | ![](https://img.shields.io/github/stars/threatexpress/cs2modrewrite) | ![](https://img.shields.io/github/languages/top/threatexpress/cs2modrewrite) |
| Synthesis | [cs2webconfig](https://github.com/bashexplode/cs2webconfig) | Automatically Generate Rulesets for IIS for Intelligent HTTP/S C2 Redirection | ![](https://img.shields.io/github/stars/bashexplode/cs2webconfig) | ![](https://img.shields.io/github/languages/top/bashexplode/cs2webconfig) |
| Synthesis | [RedGuard](https://github.com/wikiZ/RedGuard) | RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check. | ![](https://img.shields.io/github/stars/wikiZ/RedGuard) | ![](https://img.shields.io/github/languages/top/wikiZ/RedGuard) |
| Synthesis | [WebGuard](https://github.com/sairson/WebGuard) | WebGuard是根据风起师傅的RedGuard和mgeeky师傅的RedWarden结合出来的http请求过滤器go包,亦在帮助采用go编写C2 http监听器做流量过滤和规则匹配 | ![](https://img.shields.io/github/stars/sairson/WebGuard) | ![](https://img.shields.io/github/languages/top/sairson/WebGuard) |
| Synthesis | [RedWarden](https://github.com/mgeeky/RedWarden) | Flexible CobaltStrike Malleable Redirector | ![](https://img.shields.io/github/stars/mgeeky/RedWarden) | ![](https://img.shields.io/github/languages/top/mgeeky/RedWarden) |
| Synthesis | [RedCaddy](https://github.com/XiaoliChan/RedCaddy) | C2 redirector base on caddy | ![](https://img.shields.io/github/stars/XiaoliChan/RedCaddy) | ![](https://img.shields.io/github/languages/top/XiaoliChan/RedCaddy) |
| Synthesis | [Oratu](https://github.com/ort4u/Ortau) | 一个用于隐藏C2的、开箱即用的反向代理服务器。旨在省去繁琐的配置Nginx服务的过程。 | ![](https://img.shields.io/github/stars/ort4u/Ortau) | ![](https://img.shields.io/github/languages/top/ort4u/Ortau) |
| Synthesis | [Oss-stinger](https://github.com/9bie/oss-stinger) | 利用oss实现http转发/cobalt strike上线 | ![](https://img.shields.io/github/stars/9bie/oss-stinger) | ![](https://img.shields.io/github/languages/top/9bie/oss-stinger) |
| Synthesis | [Apache Mod_Rewrite Terrafrom Automation](https://github.com/cedowens/Mod_Rewrite_Automation) | Bash scripts that take variables from the user and then call terraform scripts to automate standing up apache2 with mod_rewrite in front of C2 servers. Right now, this repo supports standing up redirectors in Linode or Digital Ocean, and I have different scripts for standing up http redirectors versus https redirectors. Since the mod_rewrite redirector setup scripts use a user agent value and optionally a bearer token, these redirectors are not C2 dependent and can work for any C2 that uses http or https. | ![](https://img.shields.io/github/stars/cedowens/Mod_Rewrite_Automation) | ![](https://img.shields.io/github/languages/top/cedowens/Mod_Rewrite_Automation) |
| Synthesis | [Red-EC2](https://github.com/jfmaes/Red-EC2) | Deploy RedTeam Specific EC2 via ansible. | ![](https://img.shields.io/github/stars/jfmaes/Red-EC2) | ![](https://img.shields.io/github/languages/top/jfmaes/Red-EC2) |
| Synthesis | [Rapid Attack Infrastructure](https://github.com/obscuritylabs/RAI) | Red Team Infrastructure... Quick... Fast... Simplified. | ![](https://img.shields.io/github/stars/obscuritylabs/RAI) | ![](https://img.shields.io/github/languages/top/obscuritylabs/RAI) |
| Synthesis | [RedCommander](https://github.com/guidepointsecurity/RedCommander) | Creates two Cobalt Strike C2 servers (DNS and HTTPS), with redirectors, and RedELK in Amazon AWS. Minimal setup required! Companion Blog [here](https://www.guidepointsecurity.com/2020/08/31/introducing-red-commander-a-guidepoint-security-open-source-project/) | ![](https://img.shields.io/github/stars/guidepointsecurity/RedCommander) | ![](https://img.shields.io/github/languages/top/guidepointsecurity/RedCommander) |
| Synthesis | [CobaltPatch](https://github.com/SecIdiot/CobaltPatch) | Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be Appended In Stage / Post-Ex Blocks. Made for C Programmers | ![](https://img.shields.io/github/stars/SecIdiot/CobaltPatch) | ![](https://img.shields.io/github/languages/top/SecIdiot/CobaltPatch) |
| Synthesis | [CPLResourceRunner](https://github.com/rvrsh3ll/CPLResourceRunner) | Run shellcode(Cobalt Strike) from resource | ![](https://img.shields.io/github/stars/rvrsh3ll/CPLResourceRunner) | ![](https://img.shields.io/github/languages/top/rvrsh3ll/CPLResourceRunner) |
| Synthesis | [csdroid](https://github.com/linshaoSec/csdroid) | cobaltstrike手机客户端 / cobaltstrike android | ![](https://img.shields.io/github/stars/linshaoSec/csdroid) | ![](https://img.shields.io/github/languages/top/linshaoSec/csdroid) |
| Dev | [vscode-language-aggressor](https://github.com/darkoperator/vscode-language-aggressor) | This is a Visual Studio Code (VSC) extension that aims to provide: An implement of the Sleep and Cobalt Strike (CS) Aggressor grammar; and The definition of Cobalt Strike functions' prototype | ![](https://img.shields.io/github/stars/darkoperator/vscode-language-aggressor) | ![](https://img.shields.io/github/languages/top/darkoperator/vscode-language-aggressor) |
| Dev | [PayloadAutomation](https://github.com/emcghee/PayloadAutomation) | Payload Automation is a collection of Python classes for automating payload development, testing, opsec checking, and deployment with Cobalt Strike. | ![](https://img.shields.io/github/stars/emcghee/PayloadAutomation) | ![](https://img.shields.io/github/languages/top/emcghee/PayloadAutomation) |
| Dev | [CrackSleeve](https://github.com/izj007/CrackSleeve) | cs4.0 cs 4.1 beacon加解密 | ![](https://img.shields.io/github/stars/izj007/CrackSleeve) | ![](https://img.shields.io/github/languages/top/izj007/CrackSleeve) |
| Dev | [beacon](https://github.com/SecIdiot/beacon) | Former attempt at creating a independent Cobalt Strike Beacon | ![](https://img.shields.io/github/stars/SecIdiot/beacon) | ![](https://img.shields.io/github/languages/top/SecIdiot/beacon) |
| Dev | [ExternalC2.NET](https://github.com/rasta-mouse/ExternalC2.NET) | .NET Standard 2.0 libraries which implement Cobalt Strike's External C2 specfication (revision 0.1). | ![](https://img.shields.io/github/stars/rasta-mouse/ExternalC2.NET) | ![](https://img.shields.io/github/languages/top/rasta-mouse/ExternalC2.NET) |
| Dev | [GPUSleep](https://github.com/oXis/GPUSleep) | GPUSleep moves the beacon image to GPU memory before the beacon sleeps, and move it back to main memory after sleeping. | ![](https://img.shields.io/github/stars/oXis/GPUSleep) | ![](https://img.shields.io/github/languages/top/oXis/GPUSleep) |
| Dev | [CallStackMasker](https://github.com/Cobalt-Strike/CallStackMasker) | A PoC implementation for dynamically masking call stacks with timers. | ![](https://img.shields.io/github/stars/Cobalt-Strike/CallStackMasker) | ![](https://img.shields.io/github/languages/top/Cobalt-Strike/CallStackMasker) |
| Crack | [CSAgent](https://github.com/Twi1ight/CSAgent) | CobaltStrike 4.x通用白嫖及汉化加载器,采用javaagent+javassist的方式动态修改jar包,可直接加载原版cobaltstrike.jar,理论上支持到目前为止的所有4.x版本 | ![](https://img.shields.io/github/stars/Twi1ight/CSAgent) | ![](https://img.shields.io/github/languages/top/Twi1ight/CSAgent) |### 0x06 Related Resources
| Type | Name | Description | Popularity |
|:---:|:---:|:---:|:---:|
| DATA | [SilasCutler JARM Scan CobaltStrike Beacon Config.json](https://pastebin.com/DzsPgH9w) | SilasCutler JARM Scan CobaltStrike Beacon Config | ![](https://img.shields.io/static/v1?label=data&message=hot&color=red) |
| DATA | [Cobalt Strike hashes](https://bazaar.abuse.ch/browse/yara/CobaltStrike/) | This page shows some basic information the Yara rule CobaltStrike including corresponding malware samples. | ![](https://img.shields.io/static/v1?label=data&message=hot&color=red) |
| DATA | [List of Cobalt Strike servers](https://docs.google.com/spreadsheets/d/1bYvBh6NkNYGstfQWnT5n7cSxdhjSn1mduX8cziWSGrw/edit#gid=766378683) | List of Cobalt Strike servers | ![](https://img.shields.io/static/v1?label=data&message=hot&color=red) |
| DATA | [CobaltStrike samples pass=infected](https://www.dropbox.com/s/o5493msqarg3iyu/Cobalt%20Strike.7z?dl=0) | CobaltStrike samples | ![](https://img.shields.io/static/v1?label=data&message=hot&color=red) |
| DATA | [List of spawns from exposed Cobalt Strike C2](https://gist.github.com/MHaggis/bdcd0e6d5c727e5b297a3e69e6c52286) | List of spawns from exposed Cobalt Strike C2 | ![](https://img.shields.io/static/v1?label=data&message=hot&color=red) |
| DATA | [C2IntelFeeds](https://github.com/drb-ra/C2IntelFeeds) | Automatically created C2 Feeds based of Censys | ![](https://img.shields.io/static/v1?label=data&message=hot&color=red) |
| YARA | [apt_cobaltstrike](https://github.com/Neo23x0/signature-base/blob/master/yara/apt_cobaltstrike.yar) | Cobalt Strike Yara | ![](https://img.shields.io/static/v1?label=yara&message=hot&color=red) |
| YARA | [apt_cobaltstrike_evasive](https://github.com/Neo23x0/signature-base/blob/master/yara/apt_cobaltstrike_evasive.yar) | Cobalt Strike Yara | ![](https://img.shields.io/static/v1?label=yara&message=hot&color=red) |
| YARA | [rules](https://github.com/Te-k/cobaltstrike/blob/master/rules.yar) | Cobalt Strike Yara | ![](https://img.shields.io/static/v1?label=yara&message=hot&color=red) |
| Rules | [suricata-rules](https://github.com/suricata-rules/suricata-rules) | Suricata IDS rules used to detect the red team penetration/malicious behavior, support testing CobaltStrike/MSF/Empire/DNS tunnels/Weevely scorpion/mining/rebound/kitchen/ice shell/ICMP tunnel, etc | ![](https://img.shields.io/static/v1?label=Rules&message=hot&color=red) |