CobaltStrike 4.0 - 4.5 Patch

Related tags

Spring Boot 0xagent
Overview

0xagent

CobaltStrike 4.0 - 4.5 Patch

Changed from CSAgent. review by dust-life.

The key for 4.5 is not available here, Just a loader.

features

  • Check the file hash from CS official Website
  • Patch javaagemt detection
  • Patch Authorization
  • Patch Checksum8
  • Patch profile saving feature, so that your configuration information will not be saved in .aggressor.prop, preventing information leakage by countermeasures.

Just that's all.

Tips

  • Using jdk8 will make the startup time as long as 10-15s
  • Versions after using jdk8 will start immediately
  • If you want to use the checksum8 feature, name the profile c3.profile.

Usage

image

e.g: 4.4 key

Client

java -XX:ParallelGCThreads=4 -XX:+AggressiveHeap -XX:+UseParallelGC -Xms512M -Xmx1024M -javaagent:0xagent.jar=5e98194a01c6b48fa582a6a9fcbb92d6 -jar cobaltstrike.jar

image

Teamserver

java -XX:ParallelGCThreads=4 -Dcobaltstrike.server_port=59850 -Djavax.net.ssl.keyStore=./xxxx.store -Djavax.net.ssl.keyStorePassword=xxxxxx -server -XX:+AggressiveHeap -XX:+UseParallelGC -javaagent:0xagent.jar=5e98194a01c6b48fa582a6a9fcbb92d6 -classpath ./cobaltstrike.jar server.TeamServer $*
You might also like...
Comments
  • java.security.NoSuchAlgorithmException: Error constructing implementation

    java.security.NoSuchAlgorithmException: Error constructing implementation

    Default CS4.5 jar file with the command line args in the readme. Running from kali default install. On Windows I get a different error.

    Linux error: [-] Trapped java.net.SocketException during team server startup [main]: java.security.NoSuchAlgorithmException: Error constructing implementation (algorithm: Default, provider: SunJSSE, class: sun.security.ssl.SSLContextImpl$DefaultSSLContext) java.net.SocketException: java.security.NoSuchAlgorithmException: Error constructing implementation (algorithm: Default, provider: SunJSSE, class: sun.security.ssl.SSLContextImpl$DefaultSSLContext) at java.base/javax.net.ssl.DefaultSSLServerSocketFactory.throwException(SSLServerSocketFactory.java:177) at java.base/javax.net.ssl.DefaultSSLServerSocketFactory.createServerSocket(SSLServerSocketFactory.java:205) at ssl.SecureServerSocket.(Unknown Source) at server.TeamServer.B(Unknown Source) at server.TeamServer.main(Unknown Source) Caused by: java.security.NoSuchAlgorithmException: Error constructing implementation (algorithm: Default, provider: SunJSSE, class: sun.security.ssl.SSLContextImpl$DefaultSSLContext) at java.base/java.security.Provider$Service.newInstance(Provider.java:1868) at java.base/sun.security.jca.GetInstance.getInstance(GetInstance.java:236) at java.base/sun.security.jca.GetInstance.getInstance(GetInstance.java:164) at java.base/javax.net.ssl.SSLContext.getInstance(SSLContext.java:185) at java.base/javax.net.ssl.SSLContext.getDefault(SSLContext.java:110) at java.base/javax.net.ssl.SSLServerSocketFactory.getDefault(SSLServerSocketFactory.java:74) at ssl.SecureServerSocket.A(Unknown Source) ... 3 more Caused by: java.security.KeyManagementException at java.base/sun.security.ssl.SSLContextImpl$DefaultManagersHolder.(SSLContextImpl.java:942) at java.base/sun.security.ssl.SSLContextImpl$DefaultSSLContext.(SSLContextImpl.java:1111) at java.base/jdk.internal.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at java.base/jdk.internal.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) at java.base/java.lang.reflect.Constructor.newInstanceWithCaller(Constructor.java:499) at java.base/java.lang.reflect.Constructor.newInstance(Constructor.java:480) at java.base/java.security.Provider$Service.newInstanceOf(Provider.java:1879) at java.base/java.security.Provider$Service.newInstanceUtil(Provider.java:1886) at java.base/java.security.Provider$Service.newInstance(Provider.java:1861) ... 9 more

    Windows error: java.lang.RuntimeException: Header e_magic Magic Failed: 0 expected (23117) at pe.PEParser.error(Unknown Source) at pe.PEParser.header(Unknown Source) at pe.PEParser.parse(Unknown Source) at pe.PEParser.(Unknown Source) at pe.PEParser.load(Unknown Source) at pe.PEEditor.getInfo(Unknown Source) at pe.PEEditor.checkAssertions(Unknown Source) at pe.MalleablePE.pre_process(Unknown Source) at c2profile.Preview.getPE(Unknown Source) at c2profile.Preview.summarize(Unknown Source) at server.ManageUser.process(Unknown Source) at server.ManageUser.run(Unknown Source) at java.base/java.lang.Thread.run(Thread.java:832) ←[01;31m[-]←[0m Trapped java.lang.IllegalArgumentException during manage user [Manage: codex]: No location for 'Characteristics' java.lang.IllegalArgumentException: No location for 'Characteristics' at pe.PEParser.getLocation(Unknown Source) at pe.PEEditor.setCharacteristic(Unknown Source) at pe.PEEditor.stompPE(Unknown Source) at pe.MalleablePE.pre_process(Unknown Source) at c2profile.Preview.getPE(Unknown Source) at c2profile.Preview.summarize(Unknown Source) at server.ManageUser.process(Unknown Source) at server.ManageUser.run(Unknown Source) at java.base/java.lang.Thread.run(Thread.java:832)

    opened by CodeXTF2 12
  • Exception in thread

    Exception in thread "main" java.lang.StringIndexOutOfBoundsException: String index out of range: 31

    [+] Patch exit Exception in thread "main" java.lang.StringIndexOutOfBoundsException: String index out of range: 31 at java.base/java.lang.StringLatin1.charAt(StringLatin1.java:47) at java.base/java.lang.String.charAt(String.java:693) at common.Authorization.hex2bytes(Unknown Source) at common.Authorization.(Unknown Source) at server.TeamServer.main(Unknown Source)

    opened by badboycxcc 1
Releases(1.1)
Owner
Like0x
Like0x
CobaltStrike and Google Auth twice

GoogleAuth 基于cobaltStrike的谷歌二次验证 语言:Java 目的:实现在多人联合中的安全验证 原文:https://my.oschina.net/u/4587690/blog/5161930 开发原因:很简单,原文没有源代码。也没有jar包,不能“拿来吧你”。所以就自己写算了。

null 58 Dec 20, 2022
Scan and patch tool for CVE-2021-44228 and related log4j concerns.

A Log4J2 CVE-2021-44228 Vulnerability Scanner and Patcher Links to download the latest version: Linux x64 with glibc2.17+ (RHEL7+) Windows & all other

SAS Software 33 Jun 1, 2022
Non intrusive log4j2 RCE vulnerability patch.

Log4j Patch Resolve the RCE vulnerability caused by JNDI lookup in log4j 2.0~2.14.1. It is licensed under the WTFPL 2.0 license, you can do anything w

Glavo 67 Dec 2, 2022
CobaltStrike 4.x通用白嫖及汉化加载器

CSAgent CobaltStrike 4.x通用白嫖及汉化加载器 采用javaagent+javassist的方式动态修改jar包,可直接加载原版cobaltstrike.jar,理论上支持到目前为止的所有4.x版本 PS:汉化原理部分代码白嫖于外面公开的汉化版本,非我原创 这可能是迄今为止最全

null 1.2k Jul 22, 2022
CobaltStrike and Google Auth twice

GoogleAuth 基于cobaltStrike的谷歌二次验证 语言:Java 目的:实现在多人联合中的安全验证 原文:https://my.oschina.net/u/4587690/blog/5161930 开发原因:很简单,原文没有源代码。也没有jar包,不能“拿来吧你”。所以就自己写算了。

null 58 Dec 20, 2022
A client-side Fabric mod for Minecraft Beta 1.7.3 that allows you to connect to servers running almost any patch from Alpha v1.1.2_01 to Beta 1.7.3.

multiversion-fabric A client-side Fabric mod for Minecraft Beta 1.7.3 that allows you to connect to servers running almost any patch from Alpha v1.1.2

0n1 2 Mar 13, 2022
Scan and patch tool for CVE-2021-44228 and related log4j concerns.

A Log4J2 CVE-2021-44228 Vulnerability Scanner and Patcher Links to download the latest version: Linux x64 with glibc2.17+ (RHEL7+) Windows & all other

SAS Software 33 Jun 1, 2022
OptiFine 1.7.3 HD MT G2 (+ Long Distance Patch) port to Fabric.

Fabric Example Mod with StationAPI and BIN Mappings for beta 1.7.3 server + client Setup See the StationAPI wiki. Common Issues Here. License This tem

null 4 Dec 2, 2022
log4j2-scan is a single binary command-line tool for CVE-2021-44228 vulnerability scanning and mitigation patch

log4j2-scan is a single binary command-line tool for CVE-2021-44228 vulnerability scanning and mitigation patch. It also supports nested JAR file scan

Logpresso GitHub 839 Dec 29, 2022
Non intrusive log4j2 RCE vulnerability patch.

Log4j Patch Resolve the RCE vulnerability caused by JNDI lookup in log4j 2.0~2.14.1. It is licensed under the WTFPL 2.0 license, you can do anything w

Glavo 67 Dec 2, 2022