The Cobalt Strike team is excited to sponsor the Darknet Diaries podcast, which brings awareness to critical cybersecurity issues and encourages proactive efforts that bolster defenses against modern threats and attackers.

Cobalt Strike is a threat emulation tool that enables security professionals to simulate the tactics and techniques of a stealthy long-term embedded attacker in an IT environment. It supports red team engagements by prioritizing operator flexibility with a malleable C2 framework and Beacon, an adaptable signature payload. Users can tailor engagements to suit their needs and can easily incorporate their own tools and techniques, as well as the tools of the Cobalt Strike user community.

See these features in action in our on-demand demo:

Demo includes features from release 4.6 and before. Demo update for 4.10 in progress.

Get Pricing for Cobalt Strike

Start the process to begin putting your defenses to the test.

Further Amplify Engagements with the Red Team Bundle

Outflank Security Tooling (OST) is an evasive toolkit made for red teamers by red teamers. It is built for performing in mature and sensitive target environments to efficiently simulate techniques currently used by APTs and other cyber attackers. OST’s toolkit has coverage for every aspect of an engagement, with tools for initial breach, lateral movements, privilege escalation, achieving persistence, and final exfiltration.  

Cobalt Strike and OST can be bundled together for a reduced price, enabling organizations to benefit from red teaming tools that seamlessly integrate with one another.

The following use cases show how users can take advantage of the Red Team Bundle: 

Payload generator is used for creating stealthy payloads equipped with anti-forensics and other obfuscation methods for tasks like phishing, privilege escalation, or lateral movements. Users with the Red Team Bundle can export Cobalt Strike payloads through this tool to enrich the evasiveness of the payload.

ShovelNG is a lateral movement toolkit for remote code execution that incorporates specialized techniques for moving undetected throughout the targeted environment. Implemented through BOFs, this tool is easily integrated into Cobalt Strike.

Hidden Desktop enables a full, non-intrusive take over the desktop of a target user, including use of applications and hardware tokens. This custom implementation of “Hidden VNC” can be deployed through Cobalt Strike, all without the user knowing what is happening.

OST offers multiple BOF capabilities for extending Cobalt Strike, including Kerberos interaction, novel coercion techniques, O365 token extraction, and more.

Bundle Cobalt Strike

Get additional offensive security tooling coverage and access special pricing when combining Cobalt Strike and Outflank Security Tooling.