MalleableC2-Profiles

Malware profile

A collection of Cobalt Strike Malleable C2 profiles mimicking malicious Windows update processes

A collection of Cobalt Strike Malleable C2 profiles

GitHub

34 stars
4 watching
9 forks
last commit: about 4 years ago

Related projects:

Repository Description Stars
xx0hcd/malleable-c2-profiles A collection of pre-defined threat actor profiles used in Cobalt Strike 765
bc-security/malleable-c2-profiles A collection of C2 profiles used in post-exploitation frameworks 341
threatexpress/malleable-c2 A comprehensive guide and reference project for designing Cobalt Strike Malleable C2 profiles 1,619
rsmudge/malleable-c2-profiles A collection of pre-defined profiles for redefining indicators in a C2 communication framework. 1,489
wikiz/service_cobaltstrike A CobaltStrike profile repository containing metadata and information about the CobaltStrike malware 39
codextf2/burp2malleable Converts HTTP requests from Burp Suite into a format compatible with Cobalt Strike Malleable C2 profiles. 368
byt3bl33d3r/pymalleablec2 A Python library for parsing, modifying, and validating Malleable C2 profiles using an Abstract Syntax Tree (AST) approach. 267
wkl-sec/malleable-cs-profiles A collection of tools to generate and modify shellcode profiles to evade detection in Cobalt Strike 374
redsiege/c2concealer A command line tool that generates randomized C2 malleable profiles for use in threat simulation and red teaming exercises. 1,013
d00movenok/gomalleable A Go library for parsing and assembling Malleable C2 profiles. 60
vernamlab/medusa Automated attack synthesis tool for discovering vulnerabilities in CPU architecture and cryptographic protocols 18
crossc2/autorebind Automatically converts Malleable C2 profile into communication library source code 19
threatexpress/cs2modrewrite Automates conversion of Cobalt Strike profiles to modrewrite scripts for HTTP C2 redirection 583
sriharikapu/sriharikapu A GitHub profile showcasing a developer's interests and values 27
misterch0c/malsploitbase A repository of publicly available malware exploits targeting specific infrastructure. 538