Cobalt Strike 4.7: The 10th Anniversary Edition | Cobalt Strike
Cobalt Strike 3.5 – UNIX Post Exploitation - Cobalt Strike Research and Development
GitHub - Verizon/redshell: An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Optional Cobalt Strike integration pulls beacon SOCKS4/5 proxies from the team server.
Reverse Port Forward through a SOCKS Proxy - Cobalt Strike Research and Development
Persistence ways(The adversary is trying to maintain their foothold) | by n00🔑 | Medium
Cobalt Strike, a Defender's Guide - Part 2
Hacking through a Straw (Pivoting over DNS)
Alex Reid on LinkedIn: #cobaltstrike #redteam #penetrationtesting #c #windows #malware…
From Beacon to Interactive RDP Session - Red Team Notes
SOCKS Pivoting with Proxychains - YouTube
Proxy Windows Tooling via SOCKS. Leveraging SOCKS to proxy tools from a… | by Nick Powers | Posts By SpecterOps Team Members
Get Your SOCKS on with gTunnel. tl;dr: Steps to setup a wicked fast… | by Elliott Grey | Posts By SpecterOps Team Members
Cobalt Strike, a Defender's Guide
Virus Bulletin on Twitter: "The DFIR Report has posted the second part of its defender's guide to Cobalt Strike, which focuses on the network traffic it produced and covers topics such as
Cobalt Strike, a Defender's Guide - Part 2
Four Levels of Hacking Sophistication with Beacon - Cobalt Strike Research and Development
Linux, Left out in the Cold? - Cobalt Strike
Pivoting through Cobalt Strike | Hands-On Red Team Tactics
SensePost | Wiresocks for easy proxied routing
SOCKS Pivoting with Proxychains - YouTube
Cobalt Strike, a Defender's Guide - Part 2
Starting the Team Server
HOWTO: Port Forwards through a SOCKS proxy - Cobalt Strike