Channel Avatar

Cobalt Strike Archive @UCJU2r634VNPeCRug7Y7qdcw@youtube.com

21K subscribers - no pronouns :c

Cobalt Strike was created in 2012 to enable threat-represent


38:06
Using Direct Syscalls in Cobalt Strike's Artifact Kit
03:09
Universal Unhooking as a Beacon Object File
03:46
Session Passing from Core Impact to Cobalt Strike
04:00
Session Passing from Cobalt Strike to Core Impact [HQ]
23:22
Cobalt Strike and Core Impact Interoperability [HQ]
55:13
Core Impact 20.3 Demonstration and Tutorial for Cobalt Strike users [HQ]
12:36
CVE-2020-1472 Zerologon as a Beacon Object File
10:59
CVE-2020-0796 (SMBGhost) as a Beacon Object File
04:03
Situational Awareness Beacon Object Files by TrustedSec
37:50
Beacon Object Files - Luser Demo
08:50
Session Prepping and Session Passing (Cobalt Strike 4.0)
13:02
Artifact Kit (Cobalt Strike 4.0)
01:31
Credential Management (Cobalt Strike 4.0)
04:26
Browser Pivoting (Cobalt Strike 4.0)
09:46
DNS Beacon (Cobalt Strike 4.0)
02:39
Elevate Kit (Cobalt Strike 4.0)
03:41
External C2 (Cobalt Strike 4.0)
03:49
File Browser (Cobalt Strike 4.0)
04:58
Golden Ticket (Cobalt Strike 4.0)
10:32
HTTP Beacon (Cobalt Strike 4.0)
25:18
Malleable C2 (Cobalt Strike 4.0)
04:31
Lateral Movement (Cobalt Strike 4.0)
04:07
Session-contained PowerShell One-liner (Cobalt Strike 4.0)
03:57
Bring Your Own Weaponization - Lateral Movement
07:49
Resource Kit (Cobalt Strike 4.0)
04:22
Reverse TCP Pivot Listener (Cobalt Strike 4.0)
06:39
SMB Beacon (Cobalt Strike 4.0)
08:25
Spear Phishing (Cobalt Strike 4.0)
01:05
Spawn As (Cobalt Strike 4.0)
08:09
SSH Sessions (Cobalt Strike 4.0)
04:00
TCP Beacon (Cobalt Strike 4.0)
47:33
Red Team Ops with Cobalt Strike (9 of 9): Pivoting
01:15:05
Red Team Ops with Cobalt Strike (8 of 9): Lateral Movement
54:09
Red Team Ops with Cobalt Strike (7 of 9): Privilege Escalation
01:30:39
Red Team Ops with Cobalt Strike (6 of 9): Post Exploitation
39:46
Red Team Ops with Cobalt Strike (5 of 9): Initial Access
01:40:16
Red Team Ops with Cobalt Strike (4 of 9): Weaponization
01:42:01
Red Team Ops with Cobalt Strike (3 of 9): C2
01:49:20
Red Team Ops with Cobalt Strike (2 of 9): Infrastructure
50:27
Red Team Ops with Cobalt Strike (1 of 9): Operations
19:59
Business Operations at Strategic Cyber LLC
02:37
Block third-party DLLs in child processes
08:56
Process Argument Spoofing
05:16
Reverse TCP Pivot Listener in Cobalt Strike
09:52
TCP Beacon
07:21
PowerShell Flexibility
08:03
Obfuscate and Sleep
01:14:05
Fighting the Toolset
09:14
Internal Monologue Attack
11:59
Bypass UAC with Token Duplication
30:37
In-memory Evasion (5 of 4) - Cobalt Strike 3.11 Addendum
35:10
In-memory Evasion (1 of 4) - Detections
35:37
In-memory Evasion (2 of 4) - A Payload's Life
34:01
In-memory Evasion (3 of 4) - Evasion
09:21
In-memory Evasion (4 of 4) - Threat Emulation
09:02
Malleable HTTP Staging
06:47
Cobalt Strike and Wayland Desktops (Not Supported)
08:05
The Resource Kit
17:48
Parent Process Spoofing and Session Prepping with Cobalt Strike
17:14
Malleable Memory Indicators with Cobalt Strike's Beacon Payload