-
-
[转帖]CobaltStrike 4.9.1 Cracked Pwn3rzs
-
发表于:
2023-10-25 07:36
7643
-
[转帖]CobaltStrike 4.9.1 Cracked Pwn3rzs
CobaltStrike 4.9.1 Cracked Pwn3rzs
Down : 344K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6H3L8$3&6A6k6i4y4Q4x3X3g2U0L8r3!0#2k6q4)9J5c8X3x3J5i4K6u0r3b7$3!0T1j5h3I4@1f1%4u0A6K9$3g2Q4y4h3j5@1i4K6u0W2z5g2)9J5k6e0q4Q4y4h3k6o6M7X3q4U0K9$3g2V1i4K6g2X3f1s2N6F1x3%4u0*7M7#2)9J5k6e0N6*7i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
Passw : 20231016_1718
- uHook.jar is obfuscated
- TeamServerImage is packed and watermarked
- Client and TeamServer are tied to each other with Watermark
- .auth file is self forged so there is no leakage of watermark
- Everything we provide is for educational / training purposes and not for use in black hat operations or in production environment.
- Packing / Obfuscating / Watermarking our releases makes it harder to rip off and get credit for
- Remember that wherever you get something from the internet, run it in a VM in a closed and / or filtered environment
Files integrity :
- 4efd615097e668240f433584c03ec3060a515a95e3827e64704b44c7f4da6830 CobaltSrike_4.9.1_Cracked_Pwn3rzs.7z
- f350ab5ca2a13db470fac76f7bfe80651a0aa577c9cf05afab301bacc9761e7c Client/cobaltstrike-client.cmd
- fa1500c6063da19a3a9931dd07d56bac206d594ba7ca9dd2d91456640a4d43ae Client/cobaltstrike-client.jar
- d47aa862d1808791c4d919b4984938ded2e1102c4243d79c53b4574d59222081 Client/cobaltstrike-client.sh
- 91f185781e1197cb6d587c5dfb4e860e7b361f96cb37a60b39aa5d6b7b1ec91d Client/cobaltstrike.auth
- 1aefd3ceaad597d16b7f314826956988c30edec2948664e7c2537133e5a3fdc5 Client/uHook.jar
- b368e59fbd358b0db66e37c3e1244cd61e2ec62d6c80045d2b6f54dca8a7b6f8 Server/c2lint
- 91f185781e1197cb6d587c5dfb4e860e7b361f96cb37a60b39aa5d6b7b1ec91d Server/cobaltstrike.auth
- be08c1ebe5a776b5b76b4b4d878c2324bf0d6171c62dcbf8ce1fd49e4ad60770 Server/source-common.sh
- ba029d38ec2b0e48f8299cc1c36b08e2215dc9b3b9fe6a1382ea75fd960b6175 Server/teamserver
- fa0b9f181f3c676d2124d4a6d2be0a12fdad5da124b8d525b8c91d747288a781 Server/TeamServerImage
- 627719d254c8168c56c8fbd40c88fbb65ebe141995b8c65763103aa07e117d47 Server/third-party/README.winvnc.txt
- 13feaa32e4b03ede8799e5bee6f8d54c3af715a6488ad32f6287d8f504c7078b Server/third-party/winvnc.x64.dll
- c50183eed715ec2392249e334940acf66315797a740a8fe782934352fed144c6 Server/third-party/winvnc.x86.dll
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课