πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
  • Tools
    • AV Evasion
    • Active Directory
    • C2 Frameworks
      • THIS APPLIES TO ALL C2 FRAMEWORKS BUT MAY DIFFER ONLY IN WORDING
      • Reddit C2
      • Cobalt Strike
        • Cobalt Strike Aggressor Script Language and Script loading and setup
        • Beacon Command Behavior and OPSEC Considerations
        • Beacon Data Store
        • Cobalt Strike's Beacon Payload
        • Browser Pivoting
        • Cobalt Strike Community Kit
        • DNS Beacon
        • Data Management
        • External C2
        • Foreign Listeners
        • HTTP Proxy Configuration
        • HTTP and HTTPS Beacon
        • Listener and Infrastructure Management
        • Payload Staging
        • Redirectors
        • SMB Beacon
        • COBALT STRIKE
        • TCP Beacon
        • Unicode Support
        • User Interface
        • Beacon Object Files
        • Initial Access
        • Malleable Command and Control
          • Beacon Options
          • Checking for Errors with c2lint program
          • Code Signing Certificate
          • DNS Beacons
          • Data Transform Language
          • HTTP Beacons
          • HTTP Host Profiles
          • HTTP Server Configuration
          • HTTP Staging
          • A Beacon HTTP Transaction Walkthrough
          • Malleable C2 advice
          • Malleable Command and Control (C2)
          • Profile Language
          • Profile Variants
          • SSL Certificates with HTTPS Beacon
          • Strings, Headers and Parameters
        • Malleable PE
        • Modifications and Projects
        • Payload Artifacts and Anti-virus Evasion
        • Post Exploitation
        • Techniques
      • Koadic
      • Powershell Empire
      • Sliver
    • Data Manipulation
    • Exploitation Frameworks
    • Fuzzers
    • Miscellaneous
    • Network Scanners
    • Network Sniffers
    • OSINT
    • Password Crackers
    • Phishing Campaigns
    • Scripting Languages
    • Vulnerability Scanners
    • Web Applications
    • Wireless
    • Enumeration
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Toolschevron-right
  2. C2 Frameworkschevron-right
  3. Cobalt Strike

Malleable Command and Control

Beacon Optionschevron-rightChecking for Errors with c2lint programchevron-rightCode Signing Certificatechevron-rightDNS Beaconschevron-rightData Transform Languagechevron-rightHTTP Beaconschevron-rightHTTP Host Profileschevron-rightHTTP Server Configurationchevron-rightHTTP Stagingchevron-rightA Beacon HTTP Transaction Walkthroughchevron-rightMalleable C2 advicechevron-rightMalleable Command and Control (C2)chevron-rightProfile Languagechevron-rightProfile Variantschevron-rightSSL Certificates with HTTPS Beaconchevron-rightStrings, Headers and Parameterschevron-right
PreviousScripted Web Delivery (S)chevron-leftNextBeacon Optionschevron-right

Last updated 8 months ago