information about EDRs that can be useful during red team exercise
https://github.com/Mr-Un1k0d3r/EDRs/
https://github.com/Mr-Un1k0d3r/EDRs/
GitHub
GitHub - Mr-Un1k0d3r/EDRs
Contribute to Mr-Un1k0d3r/EDRs development by creating an account on GitHub.
Using Cloudflare Workers as Redirectors
https://ajpc500.github.io/c2/Using-CloudFlare-Workers-as-Redirectors/
https://ajpc500.github.io/c2/Using-CloudFlare-Workers-as-Redirectors/
ajpc500
Using Cloudflare Workers as Redirectors
All things purple team.
Cobalt Strike: Decrypting DNS Traffic – Part 5
https://blog.nviso.eu/2021/11/29/cobalt-strike-decrypting-dns-traffic-part-5/
https://blog.nviso.eu/2021/11/29/cobalt-strike-decrypting-dns-traffic-part-5/
NVISO Labs
Cobalt Strike: Decrypting DNS Traffic – Part 5
Cobalt Strike beacons can communicate over DNS. We show how to decode and decrypt DNS traffic in this blog post. This series of blog posts describes different methods to decrypt Cobalt Strike traff…
Hook Heaps and Live Free
https://www.cyberark.com/resources/threat-research-blog/hook-heaps-and-live-free
https://www.cyberark.com/resources/threat-research-blog/hook-heaps-and-live-free
Cyberark
Hook Heaps and Live Free
I wanted to write this blog post to talk a bit about Cobalt Strike, function hooking and the Windows heap. We will be targeting BeaconEye (https://github.com/CCob/BeaconEye) as our detection tool...
ArtifactKit
There is no licensed Cobalt Strike property within this repository.
https://github.com/NotMedic/ArtifactKit
There is no licensed Cobalt Strike property within this repository.
https://github.com/NotMedic/ArtifactKit
GitHub
GitHub - NotMedic/ArtifactKit
Contribute to NotMedic/ArtifactKit development by creating an account on GitHub.
Staging Cobalt Strike with mTLS using Caddy
https://improsec.com/tech-blog/staging-cobalt-strike-with-mtls-using-caddy
https://github.com/improsec/CaddyStager
https://improsec.com/tech-blog/staging-cobalt-strike-with-mtls-using-caddy
https://github.com/improsec/CaddyStager
Itm8
Improsec is now a part of itm8
Improsec and the 12 other companies of itm8 are joining forces to become one itm8. Together, we will ensure the best possible services within...
Block This Now: Cobalt Strike and Other Red-Team Tools
https://www.paymentsecurity.io/blogs/block-this-now-cobalt-strike-other-red-team-tools-p-3167
https://www.paymentsecurity.io/blogs/block-this-now-cobalt-strike-other-red-team-tools-p-3167
www.paymentsecurity.io
Block This Now: Cobalt Strike and Other Red-Team Tools
Attackers continue to employ commercial penetration testing tools as well as "living off the land" tactics - using legitimate tools or functionality already present in a network - to exploit victims. Accordingly, organizations must monitor for both, to better…
Attackers are abusing MSBuild to evade defenses and implant Cobalt Strike beacons
https://morphuslabs.com/attackers-are-abusing-msbuild-to-evade-defenses-and-implant-cobalt-strike-beacons-edac4ab84f42
https://morphuslabs.com/attackers-are-abusing-msbuild-to-evade-defenses-and-implant-cobalt-strike-beacons-edac4ab84f42
Link Slot MODUS99
MODUS99 ✈️ Link Game Slot Online Provider Terbaru GGSOFT
Modus99 salah satu link game slot online yang memiliki provider terbaru yaitu Ggsoft dan hanya ada di Modus 99 lengkap dengan bocoran permainan paling gacor
Extracting clear-text passwords from VeraCrypt.exe using API hooking
https://github.com/snovvcrash/VeraCryptThief
https://github.com/snovvcrash/VeraCryptThief
Russian Hackers Heavily Using Malicious Traffic Direction System to Distribute Malware
https://thehackernews.com/2022/01/russian-hackers-heavily-using-malicious.html
https://thehackernews.com/2022/01/russian-hackers-heavily-using-malicious.html
SourcePoint v2.1 releases: polymorphic C2 profile generator for Cobalt Strike C2s
https://securityonline.info/sourcepoint-polymorphic-c2-profile-generator-for-cobalt-strike-c2s/
https://securityonline.info/sourcepoint-polymorphic-c2-profile-generator-for-cobalt-strike-c2s/
securityonline.info
SourcePoint v3.0 releases: polymorphic C2 profile generator for Cobalt Strike C2s
SourcePoint allows unique C2 profiles to be generated on the fly that helps reduce our Indicators of Compromise ("IoCs")
minimal-defender-bypass.profile
1.2 KB
Minimal Cobalt Strike C2 Profile for Bypassing Defender
https://gist.github.com/tothi/8abd2de8f4948af57aa2d027f9e59efe
https://gist.github.com/tothi/8abd2de8f4948af57aa2d027f9e59efe
Cobalt Strike, a Defender’s Guide – Part 2
https://thedfirreport.com/2022/01/24/cobalt-strike-a-defenders-guide-part-2/
https://thedfirreport.com/2022/01/24/cobalt-strike-a-defenders-guide-part-2/
The DFIR Report
Cobalt Strike, a Defender’s Guide – Part 2
Our previous report on Cobalt Strike focused on the most frequently used capabilities that we had observed. In this report, we will focus on the network traffic it produced, and provide some easy w…