Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite Logo

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

0
Free
Visit Website

Imagine you are performing a Red Team engagement and want to reduce the risk of being caught by using a redirector host to filter C2 traffic to your Cobalt Strike server and redirect all other traffic to an innocuous website. One way to achieve this is by setting up an Apache redirector as an intermediary server, allowing your C2 domain to point at it for traffic filtering. This setup provides the benefit of being able to change the redirector's IP and domain if your main server is compromised.

FEATURES

ALTERNATIVES

A DNS rebinding exploitation framework

Wfuzz is a tool designed for bruteforcing Web Applications with multiple features like multiple injection points, recursion, and payload combinations.

A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.

A scripting engine for interacting with GraphQL endpoints for pentesting purposes.

A collection of precompiled Windows exploits for privilege escalation.

APT Simulator is a tool for simulating a compromised system on Windows.

A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.

Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved