We’re excited to announce the launch of a brand-new Cobalt Strike training course, created in collaboration between Fortra and Zero-Point Security. This unique partnership brings together the expertise of Cobalt Strike’s team with the field-tested training experience of Zero-Point Security to deliver an unmatched learning opportunity. Through this course users can learn how to use […]
Read More… from Get to Know Cobalt Strike: New Introductory Training
Take your red team skills to the next level with this Cobalt Strike Introductory training course, created through a collaboration between the experts at Zero Point Security and Cobalt Strike. Through these guided modules, you’ll explore the framework from the ground up—starting with setup and core commands, then advancing into post-exploitation, network bypass, and tool […]
Read More… from Get Pricing: Cobalt Strike Introductory Training
TL;DR: In this blog we’ll demonstrate how to instrument Beacon via BeaconGate and walk through our implementations of return address spoofing, indirect syscalls, and a call stack spoofing technique, Draugr, that are now available in Sleepmask-VS. Furthermore, we’ll provide tips and tricks for developers in getting set up with Sleepmask-VS so they can write their […]
Read More… from Dynamically Instrumenting Beacon With BeaconGate – For All Your Call Stack Spoofing Needs!
Check us out at SecretCon 2025! PAIKKA Vandalia Tower, St. Paul, MN […]
Read More… from SecretCon 2025
Come see us at Showmecon! Ameristar Casino & Resort One Ameristar Blvd., St. Charles, MO, 63301 US […]
Read More… from ShowMeCon 2025
Cobalt Strike 4.11.1 is now available. This is an out of band update to fix an issue regarding module stomping that was discovered in the 4.11 release that we felt should be fixed prior to the next release. Besides that issue, this out of band release also allowed us to include two other smaller bugfixes/quality […]
Read More… from Out of Band Update: Cobalt Strike 4.11.1
Join a technical walkthrough of Cobalt Strike’s advanced capabilities for post-exploitation and adversary simulation. In the session, Cobalt Strike developers and researchers will demonstrate usage of the product and show the advanced evasion and customization of Cobalt Strike through hands-on demos. The session will be presented by Cobalt Strike product team members Pieter Ceelen and […]
Read More… from Fortra Cobalt Strike Demo Session – May 2025
Background A government agency responsible for critical public services commissions a Red Team engagement to assess its cybersecurity resilience. The exercise simulates an advanced persistent threat (APT) attack, testing the agency’s ability to detect, respond to, and mitigate cyber threats targeting sensitive government data, public infrastructure, and national security. Phase 1: Initial Access Operations The […]
Read More… from Red Team Use Case: Government Agency
Background A large financial institution conducts an assumed breach exercise to test its cybersecurity resilience. The Red Team is tasked with simulating an advanced persistent threat (APT) attack, while the Blue Team monitors, detects, and mitigates threats in real-time. Phase 1: Initial Access Operations The Red Team conducts reconnaissance on the Financial Institution’s employees using […]
Read More… from Red Team Use Case: Financial Institution
Background A regional hospital network conducts a Red Team engagement to evaluate its cybersecurity defenses. The exercise aims to simulate a sophisticated cyberattack targeting patient data, medical devices, and critical infrastructure, testing the hospital’s ability to detect, respond to, and recover from an intrusion. Phase 1: Initial Access Operations The Red Team begins by gathering […]
Read More… from Red Team Use Case: Healthcare