{
	"id": "357581c0-d88a-4725-aab1-6a3e9b0e6000",
	"created_at": "2026-04-06T00:13:42.005311Z",
	"updated_at": "2026-04-10T03:24:23.629545Z",
	"deleted_at": null,
	"sha1_hash": "50c5e2409eca009201528dc3c2e08c777aaf882d",
	"title": "Cobalt Strike | Adversary Simulation and Red Team Operations",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 49547,
	"plain_text": "Cobalt Strike | Adversary Simulation and Red Team Operations\r\nArchived: 2026-04-05 23:17:04 UTC\r\nSoftware for Adversary Simulations and Red Team Operations\r\nAdversary Simulations and Red Team Operations are security assessments that replicate the tactics and techniques\r\nof an advanced adversary in a network. While penetration tests focus on unpatched vulnerabilities and\r\nmisconfigurations, these assessments benefit security operations and incident response.\r\nCobalt Strike's iconic anime mascot\r\nLatest Release: Cobalt Strike 4.12\r\nRefreshed GUI, a REST API, User Defined C2, New Process Injection Options, UAC Bypass Refresh, and more. \r\nRead release blogs here.\r\nCobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded\r\nactor in your customer’s network. Malleable C2 lets you change your network indicators to look like different\r\nmalware each time. These tools complement Cobalt Strike’s solid social engineering process, its robust\r\ncollaboration capability, and unique reports designed to aid blue team training.\r\nGetting Started\r\nIcon\r\nGet to know Cobalt Strike \r\nhttps://www.cobaltstrike.com/\r\nPage 1 of 3\n\nLearn more about Cobalt Strike’s key features and its interoperability with our other offensive security tools, Core\r\nImpact and Outflank Security Tooling (OST).\r\nLearn More \u003e\r\nIcon\r\nGet in Touch\r\nReady to see what Cobalt Strike can do for you?\r\nGet a Demo or a quote to begin the purchase process.\r\nLearn More \u003e\r\nIcon\r\nIcon\r\nMeet Cobalt Strike\r\nDiscover the story, philosophy, and team behind\r\nCobalt Strike and learn what sets us apart.\r\nLearn More \u003e\r\nA Key Part of Fortra\r\nCobalt Strike is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s\r\ncomplex cybersecurity landscape by bringing complementary products together to solve problems in innovative\r\nways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your\r\norganization. With the help of powerful tools like Cobalt Strike, Fortra is your relentless ally, here for you every\r\nstep of the way throughout your cybersecurity journey.\r\nhttps://www.cobaltstrike.com/\r\nPage 2 of 3\n\nAbout Cobalt Strike\r\nRaphael Mudge created Cobalt Strike in 2012 to enable threat-representative security tests. Cobalt Strike was one\r\nof the first public red team command and control frameworks. In 2020, Fortra (the new face of HelpSystems)\r\nacquired Cobalt Strike to add to its Core Security portfolio and pair with Core Impact. Today, Cobalt Strike is the\r\ngo-to red team tool for many U.S. government, large business, and consulting organizations.\r\nSource: https://www.cobaltstrike.com/\r\nhttps://www.cobaltstrike.com/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.cobaltstrike.com/"
	],
	"report_names": [
		"www.cobaltstrike.com"
	],
	"threat_actors": [
		{
			"id": "610a7295-3139-4f34-8cec-b3da40add480",
			"created_at": "2023-01-06T13:46:38.608142Z",
			"updated_at": "2026-04-10T02:00:03.03764Z",
			"deleted_at": null,
			"main_name": "Cobalt",
			"aliases": [
				"Cobalt Group",
				"Cobalt Gang",
				"GOLD KINGSWOOD",
				"COBALT SPIDER",
				"G0080",
				"Mule Libra"
			],
			"source_name": "MISPGALAXY:Cobalt",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434422,
	"ts_updated_at": 1775791463,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/50c5e2409eca009201528dc3c2e08c777aaf882d.pdf",
		"text": "https://archive.orkl.eu/50c5e2409eca009201528dc3c2e08c777aaf882d.txt",
		"img": "https://archive.orkl.eu/50c5e2409eca009201528dc3c2e08c777aaf882d.jpg"
	}
}