😈 [ al3x_m3rcer, m3rcer ]
Here's the official release of Chisel-Strike: A .NET XOR encrypted Cobalt Strike Aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.
https://t.co/1wlwABP71E
#RedTeaming #CobaltStrike #Pentesting
🔗 https://github.com/m3rcer/Chisel-Strike
🐥 [ tweet ]
Here's the official release of Chisel-Strike: A .NET XOR encrypted Cobalt Strike Aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.
https://t.co/1wlwABP71E
#RedTeaming #CobaltStrike #Pentesting
🔗 https://github.com/m3rcer/Chisel-Strike
🐥 [ tweet ]
😈 [ HenriNurmi, Henri Nurmi ]
In-memory token vault BOF for #CobaltStrike. Allows you to hot swap/re-use already stolen tokens without re-duplicating, and store tokens for later use in case of a person logs out. https://t.co/34iIm5XfAw
🔗 https://github.com/Henkru/cs-token-vault
🐥 [ tweet ]
In-memory token vault BOF for #CobaltStrike. Allows you to hot swap/re-use already stolen tokens without re-duplicating, and store tokens for later use in case of a person logs out. https://t.co/34iIm5XfAw
🔗 https://github.com/Henkru/cs-token-vault
🐥 [ tweet ]
😈 [ mariuszbit, mgeeky | Mariusz Banach ]
🔥 Whooah, that's a really huge update to #CobaltStrike 4.7: enormous efforts made by @gregdarwin & Team, who once again pushed the Adversary Emulation industry by giving us:
SOCKS5, more BOFs memory mgmt primitives, greatly increased Sleep Mask size! 🔥
https://t.co/NEtyRiIQv3
🔗 https://bit.ly/3wbtNff
🐥 [ tweet ]
🔥 Whooah, that's a really huge update to #CobaltStrike 4.7: enormous efforts made by @gregdarwin & Team, who once again pushed the Adversary Emulation industry by giving us:
SOCKS5, more BOFs memory mgmt primitives, greatly increased Sleep Mask size! 🔥
https://t.co/NEtyRiIQv3
🔗 https://bit.ly/3wbtNff
🐥 [ tweet ]
😈 [ HackerRalf @hacker_ralf ]
Everyone takes a lot from the community... it's time to give something back yourself.
Kerbeus - BOF implementation of Rubeus (not all).
🔗 https://github.com/RalfHacker/Kerbeus-BOF
P. S. PM me about all bugs
#redteam #kerberos #havoc #cobaltstrike #bof
🐥 [ tweet ]
Everyone takes a lot from the community... it's time to give something back yourself.
Kerbeus - BOF implementation of Rubeus (not all).
🔗 https://github.com/RalfHacker/Kerbeus-BOF
P. S. PM me about all bugs
#redteam #kerberos #havoc #cobaltstrike #bof
🐥 [ tweet ]
👍10
Offensive Xwitter
😈 [ SafeBreach @safebreach ] This is huge. As presented at #BlackHatEurope today, see how SafeBreach Labs researcher Alon Leviev developed a brand new set of highly flexible process injection techniques that are able to completely bypass leading EDR solutions.…
😈 [ Shashwat Shah 🇮🇳 @0xEr3bus ]
Just crafted a beacon object file for the 8th variant of the powerful process injection technique by @_0xDeku. An exciting journey into the Windows Thread Pool!
#cybersecurity #redteam #infosec #cobaltstrike
🔗 https://github.com/0xEr3bus/PoolPartyBof
🐥 [ tweet ]
Just crafted a beacon object file for the 8th variant of the powerful process injection technique by @_0xDeku. An exciting journey into the Windows Thread Pool!
#cybersecurity #redteam #infosec #cobaltstrike
🔗 https://github.com/0xEr3bus/PoolPartyBof
🐥 [ tweet ]
👍2
😈 [ NVISO @NVISOsecurity ]
We've expanded our #RedTeam arsenal with a new awesome Windows LPE BOF for #CobaltStrike and #BruteRatel thanks to the original exploit author @varwara.
Get your copy here!
🔗 https://github.com/NVISOsecurity/CVE-2024-26229-BOF
🐥 [ tweet ]
We've expanded our #RedTeam arsenal with a new awesome Windows LPE BOF for #CobaltStrike and #BruteRatel thanks to the original exploit author @varwara.
Get your copy here!
🔗 https://github.com/NVISOsecurity/CVE-2024-26229-BOF
🐥 [ tweet ]
🔥4🥱3
Forwarded from APT
🔍 Exploring WinRM plugins for lateral movement
In this blog, the process of leveraging WinRM plugins to perform lateral movement to other systems is explored. Additionally, the use of the
🔗 Research:
https://falconforce.nl/exploring-winrm-plugins-for-lateral-movement/
🔗 Source:
https://github.com/FalconForceTeam/bof-winrm-plugin-jump
#ad #winrm #cobaltstrike #bof #redteam
In this blog, the process of leveraging WinRM plugins to perform lateral movement to other systems is explored. Additionally, the use of the
CIM_LogicFile WMI class to bypass certain tricky detections by Microsoft Defender is examined. Finally, all the logic is incorporated into a Cobalt Strike BOF.🔗 Research:
https://falconforce.nl/exploring-winrm-plugins-for-lateral-movement/
🔗 Source:
https://github.com/FalconForceTeam/bof-winrm-plugin-jump
#ad #winrm #cobaltstrike #bof #redteam
FalconForce
Exploring WinRM plugins for lateral movement - FalconForce
We explore how to leverage WinRM plugins to perform lateral movement to other systems and put all the logic in a Cobalt Strike BOF.
👍7🔥2