- https://www.cobaltstrike.com/aggressor-script/index.html //脱离MSF之后的Aggressor Script 成为了开源脚本引擎 Cortana 的接班人
- https://github.com/verctor/CS_xor64 //JAVA.生成cobaltstrike破解版所需的xor64.bin
- https://github.com/Mr-Un1k0d3r/SCT-obfuscator //Cobalt Strike SCT有效载荷混淆器
- https://github.com/dcsync/pycobalt //PY3.Python API for Cobalt Strike
- https://github.com/rsmudge/cortana-scripts //JAVA.作者用于cs2.x与armitage的可拓展插件,cs3.x后为AggressorScripts
- https://github.com/Und3rf10w/external_c2_framework //PY.Cobalt Strike's External C2构造CS的通讯通道。
- https://github.com/FortyNorthSecurity/AggressorAssessor //cs3.x自动化攻击脚本集合
- https://mp.weixin.qq.com/s/CEI1XYkq2PZmYsP0DRU7jg //intro.使用Aggressor脚本雕饰Cobalt Strike
- https://github.com/harleyQu1nn/AggressorScripts/ //脚本类型
- https://bbs.ichunqiu.com/thread-53015-1-1.html //[思路/技术] Cobaltstrike系列教程(十)安装扩展
- https://github.com/Ridter/CS_Chinese_support/ //cs3.0传输信息的汉化插件
- https://github.com/phink-team/Cobaltstrike-MS17-010 //cobaltstrike ms17-010(win7 x64 and win2008 r2)等插件
- https://github.com/pxss/navicatpwd //Cobalt Strike Navicate解密脚本
- https://blog.csdn.net/qq_27446553/article/details/79380021 //邮件上线提醒
- https://www.cobaltstrike.com/help-malleable-c2 //配置C2-profile文件生成个人cobaltstrike.store文件绕过流量检测
- https://github.com/ryhanson/ExternalC2 //一个用于将通信渠道与Cobalt Strike External C2服务器集成的库
- https://github.com/threatexpress/cs2modrewrite //用于将Cobalt Strike配置文件转换为mod_rewrite脚本的工具
- https://github.com/Mr-Un1k0d3r/CatMyFish //搜索分类域,为Cobalt Strike beacon C&C设置白名单域
- https://github.com/threatexpress/malleable-c2 //利用jquery文件进行C2通讯,在文件内做了JS混淆绕过防火墙
- https://github.com/DeEpinGh0st/Erebus //权限维持、横向拓展、本地提权、痕迹清理
- https://github.com/gloxec/CrossC2 //cobaltstrike插件.生成CobaltStrike的跨平台beacon.testjob.
- https://github.com/darkr4y/geacon //GO.macos系统beacon上线
- https://github.com/rsmudge/ElevateKit/ //PS.cna插件,CS利用第三方模块提权