cs2modrewrite
C2 Redirector
Automates conversion of Cobalt Strike profiles to modrewrite scripts for HTTP C2 redirection
Convert Cobalt Strike profiles to modrewrite scripts
585 stars
20 watching
114 forks
Language: Python
last commit: almost 3 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Generates random C2 profiles for testing and simulation | 631 |
| | A comprehensive guide and reference project for designing Cobalt Strike Malleable C2 profiles | 1,631 |
| | Converts HTTP requests from Burp Suite into a format compatible with Cobalt Strike Malleable C2 profiles. | 371 |
| | Automatically generated C2 feed data from Censys search results | 540 |
| | A collection of pre-defined threat actor profiles used in Cobalt Strike | 771 |
| | A Python library for parsing, modifying, and validating Malleable C2 profiles using an Abstract Syntax Tree (AST) approach. | 269 |
| | A command line tool that generates randomized C2 malleable profiles for use in threat simulation and red teaming exercises. | 1,024 |
| | Converts Cobalt Strike profiles to functional IIS web.config files for HTTP/S reverse proxy redirection | 110 |
| | An analysis project of Cobalt Strike C2 protocol in Python. | 67 |
| | Library for dissecting and parsing data related to Cobalt Strike exploits | 148 |
| | A research project that creates a Cobalt Strike-compatible Notion profile to mimic the app's behavior and facilitate collaboration | 53 |
| | An implementation of Cobalt Strike's External C2 specification using .NET libraries | 84 |
| | Automation scripts to stand up Apache2 with mod_rewrite in front of C2 servers. | 46 |
| | A collection of C2 profiles used in post-exploitation frameworks | 342 |
| | Analyzes logs from Cobalt and Empire to generate an Excel report on C2 activity, sessions, and credentials. | 20 |