The Cobalt Strike Malleable C2 Design and Reference Guide provides detailed instructions and examples on how to customize Cobalt Strike's Command and Control profiles to evade detection and blend in with normal network traffic.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.
Open-source Java application for creating proxies for traffic analysis & modification.
A penetration testing tool for intercepting SSH connections and logging plaintext passwords.
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.
Repository of tools for testing iPhone messaging by Project Zero
Macro_Pack is a tool used to automate obfuscation and generation of Office documents for pentest, demo, and social engineering assessments.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.