Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite Logo

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

0
Free
Updated 11 March 2025
Visit Website

Imagine you are performing a Red Team engagement and want to reduce the risk of being caught by using a redirector host to filter C2 traffic to your Cobalt Strike server and redirect all other traffic to an innocuous website. One way to achieve this is by setting up an Apache redirector as an intermediary server, allowing your C2 domain to point at it for traffic filtering. This setup provides the benefit of being able to change the redirector's IP and domain if your main server is compromised.

FEATURES

SIMILAR TOOLS

A proof-of-concept tool that demonstrates automated MFA bypass techniques for Microsoft Outlook through browser automation and request interception.

A tool for testing Cross Site Scripting vulnerabilities

A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.

A full-featured reconnaissance framework for web-based reconnaissance with a modular design.

A collection of precompiled Windows exploits for privilege escalation.

A script to enumerate Google Storage buckets and determine access and privilege escalation

Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.

A digital archive of the internet, allowing users to capture and browse archived web pages.

Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved