{
	"id": "1e8cd9a4-58bd-455d-89b8-bc41cfb62926",
	"created_at": "2026-04-06T00:21:39.264907Z",
	"updated_at": "2026-04-10T03:24:24.213847Z",
	"deleted_at": null,
	"sha1_hash": "d19c869afebe05002e42d0f4029581c97a5c50e0",
	"title": "Alleged source code of Cobalt Strike toolkit shared online",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1302788,
	"plain_text": "Alleged source code of Cobalt Strike toolkit shared online\r\nBy Lawrence Abrams\r\nPublished: 2020-11-11 · Archived: 2026-04-05 16:54:55 UTC\r\nThe source code for the widely-used Cobalt Strike post-exploitation toolkit has allegedly been leaked online in a GitHub\r\nrepository.\r\nCobalt Strike is a legitimate penetration testing toolkit that allows attackers to deploy \"beacons\" on compromised devices to\r\nremotely \"create shells, execute PowerShell scripts, perform privilege escalation, or spawn a new session to create a listener\r\non the victim system.\"\r\nCobalt Strike is an immensely popular tool among threat actors who use cracked versions to gain persistent remote access to\r\na compromised network. This tool is commonly seen used during ransomware attacks.\r\nhttps://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/\r\nPage 1 of 5\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/\r\nPage 2 of 5\n\nVisit Advertiser websiteGO TO PAGE\r\nTwelve days ago, a repository was created on GitHub that contains what appears to be the source code for Cobalt Strike 4.0.\r\nCobaltStrike GitHub repository\r\nBased on the 'src/main/resources/about.html' file, this source code is for Cobalt Strike 4.0 released on December 5th, 2019.\r\nSource code showing Cobalt Strike version\r\nAs can be seen from the source code below, the license check for Cobalt Strike has been commented out, which essentially\r\ncracks the program for anyone who decides to compile it.\r\nhttps://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/\r\nPage 3 of 5\n\nCobalt Strike license check commented out\r\nAdvanced Intel's Vitali Kremez, who examined the source code, told BleepingComputer that he believes the Java code was\r\nmanually decompiled. The person then fixed any dependencies and removed the license check, so that it could be compiled.\r\nSince being posted, the repository has been forked 172 times, making it hard to contain the spread of the source code.\r\nEven though it is not the original source code, it is enough to be of serious concern to security professionals.\r\n\"The possible re-compiled source code exposure of the “2019” Cobalt Strike 4.0 version has significant consequences for all\r\ndefenders as it removes barriers of entry to obtaining the tool and essentially makes its easy for the crime groups to procure\r\nand modify code as needed on the fly.\"\r\n\"The leak of the offensive tool opens the door for the additional crime actor enhancement of the tooling as it happens with\r\nthe many malware tool leaks such as for Zeus 2.0.8.9. leak and TinyNuke one as they continuously re-used and updated by\r\nthe crimewave goops and live their own “life” after the leak,\" Kremez told BleepingComputer in a conversation.\r\nBleepingComputer has contacted Cobalt Strike and their parent company Help Systems to confirm the source code's\r\nauthenticity but has not heard back.\r\nhttps://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/\r\nPage 4 of 5\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/\r\nhttps://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike-toolkit-shared-online/"
	],
	"report_names": [
		"alleged-source-code-of-cobalt-strike-toolkit-shared-online"
	],
	"threat_actors": [
		{
			"id": "610a7295-3139-4f34-8cec-b3da40add480",
			"created_at": "2023-01-06T13:46:38.608142Z",
			"updated_at": "2026-04-10T02:00:03.03764Z",
			"deleted_at": null,
			"main_name": "Cobalt",
			"aliases": [
				"Cobalt Group",
				"Cobalt Gang",
				"GOLD KINGSWOOD",
				"COBALT SPIDER",
				"G0080",
				"Mule Libra"
			],
			"source_name": "MISPGALAXY:Cobalt",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434899,
	"ts_updated_at": 1775791464,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d19c869afebe05002e42d0f4029581c97a5c50e0.pdf",
		"text": "https://archive.orkl.eu/d19c869afebe05002e42d0f4029581c97a5c50e0.txt",
		"img": "https://archive.orkl.eu/d19c869afebe05002e42d0f4029581c97a5c50e0.jpg"
	}
}