Cobalt Strike Malleable C2 Design and Reference Guide Logo

Cobalt Strike Malleable C2 Design and Reference Guide

0
Free
Visit Website

The Cobalt Strike Malleable C2 Design and Reference Guide provides detailed instructions and examples on how to customize Cobalt Strike's Command and Control profiles to evade detection and blend in with normal network traffic.

FEATURES

ALTERNATIVES

A collection of Microsoft PowerShell modules for penetration testing purposes.

A front-end JavaScript toolkit for creating DNS rebinding attacks

Collection of penetration testing scripts for AWS with a focus on reconnaissance.

Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis with various tools and resources.

A tool that scans for accessibility tools backdoors via RDP

A tool for security researchers and penetration testers to automate the process of finding sensitive information on a target domain.

Skyhook facilitates obfuscated HTTP file transfers to bypass IDS detections, enhancing secure data exchange.

Boofuzz is a network protocol fuzzing tool that aims to fuzz everything

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved