Postlar filtri


Good day.

We started our activities a year and a half ago.
Many people have made a lot of money with us.

Today we open our doors to all our people for 3 months.

Let's give some statistics: with Angel ppl drained more than $100 million

We provide advanced technologies to bypass various protections, when competitors cry “that it is impossible to bypass” - We bypass it.

Become a part of history with Angel Drainer.

For start write @angelsupport

and join in
us Channel


Сдаем экзамен по Sliver C2 framework

https://dominicbreuker.com/post/learning_sliver_c2_01_installation/#series-overview

Cobalt Strikers: @CobaltStrikers
Shop: @CobaltS
hopBot
All projects: @MalwareLinks






Cobalt Strike Aggressor script for generating GadgetToJScript payloads.

GadgetToJScript - This tool will automate the generation of payloads using the GadgetToJScript technique, in addition, the generated shellcode is compressed before being used in the injector template.

https://github.com/EncodeGroup/AggressiveGadgetToJScript

Cobalt Strikers: @CobaltStrikers
Shop: @CobaltS
hopBot
All projects: @MalwareLinks


Aaron Bushnell pro-palestine hackers are looking for professional defacers and exploiters for wider range of attacks against Israel.

If you have skills in those areas, please contact us.
@aaron_bushnell_admin


@MalwareShopBot is the only and first malware store on Telegram from the @MalwareForum project

Her
e you will find: botnet, stealer, PAT, clipper, loader, hidden miner, keylogger, worm, android viruses and much more.






Cobalt Strike HTTPS beaconing over Microsoft Graph API

GraphStrike is a set of tools that allows Cobalt Strike's HTTPS Beacon to use the Microsoft Graph API for C2 communication. All beacon traffic will be transmitted using two files created on the attacker's SharePoint site.

https://github.com/RedSiege/GraphStrike?tab=readme-ov-file

Cobalt Strikers: @CobaltStrikers
Shop: @CobaltS
hopBot
Powered by @MalwareForum


Link update:
'https://t.me/addlist/4N6B0jwPTK04NmI0' rel='nofollow'>https://t.me/addlist/4N6B0jwPTK04NmI0




Offering Cobalt Strike (latest version) deployment services

Licensed/original versions of Cobalt Strike (latest version)
Original hash. Arsenal's latest form is all forms. Lifetime option available (tool is guaranteed not to be locked).

Latest version of the cracked version of Cobalt Strike (lifetime)
Lifetime option available (tool is guaranteed not to be locked).
Software Update.
Latest form of Arsenal - all forms including all kits (Artifact, SleepMask, Mimikatz, etc.)

A unique Cobalt Strike profile is created for each install.
Teamserver is installed on your VPS.
Anti-abuse domains and servers (on request)
Spambot protection
JARM randomization
Redirectors (custom on request)
Kit does not work for CIS targets.


Cobalt Strike (cracked) install - 500$
Cobalt Strike (original) install - 5500$
Crypt x86/x64 DLL shellcod - 100$

Link:
t.me/malwar

For commands are possible separate offers.
Guarantor is welcome


CobaltStrikeScan

Scan files or process memory for Beacons and analyze their configuration will identify the Windows process for evidence of DLL injection (classical or reflective injection) and/or perform a Yara scan on the target process "memory" for Cobalt V3 and V4 Beacons signatures.

https://github.com/Apr4h/CobaltStrikeScan

Cobalt Strikers: @CobaltStrikers
Shop: @CobaltS
hopBot
Powered by @MalwareForum


Memfiles

This is a toolkit for CobaltStrike Toolkit to record files created by Beacon for memory instead of disk, which allows operators to write files created by the Beacon process into memory instead of writing them to disk on the target system. It has been successfully tested

https://github.com/Octoberfest7/MemFiles

Cobalt Strikers: @CobaltStrikers
Shop: @CobaltS
hopBot
Powered by @MalwareForum




SeeProxy

Golang Reverse Proxy with Cobalt Strike Malleable Profile Verification.
The premise of this tool is to expose your TeamServer to the world instead, into a single Seeproxy instance.
This way, every request that reaches your team is legitimate C2 traffic.

https://github.com/nopbrick/SeeProxy

Cobalt Strikers: @CobaltStrikers
Shop: @CobaltS
hopBot
Powered by @MalwareForum






DelegationBOF

This tool uses LDAP to check the domain for known abusive Kerberos delegation settings. It currently supports RBCD, bounded, bounded with transition, and unrestricted delegation checks.
Also, the author added a couple of functions to what was already known to everyone, since the main part of the code was already there. So now there is a get-spns command that can look for ASREP accounts or SPNs that support Kerberoastable.

https://github.com/IcebreakerSecurity/DelegationBOF

Cobalt Strikers: @CobaltStrikers
Shop: @CobaltS
hopBot
Powered by @MalwareForum

20 ta oxirgi post ko‘rsatilgan.