Resource Kit
The Resource Kit can be found in C:\Tools\cobaltstrike\arsenal-kit\kits\resource
. The portion of the ThreatCheck output that we want to pay attention to is the for
loop.
\
The 64-bit stageless PowerShell payload is taken from template.x64.ps1
. Interestingly, if we open it in Visual Studio Code, we see the following on lines 26-28:
\
HelpSystems have already provided a template with different variable names - $zz
in place of $x
and $v_code
in place of $var_code
. This will bypass Defender as it is, so we don't actually need to modify it. As before, use the included build script and specify an output directory, then load resources.cna
into Cobalt Strike.
\
Regenerate your payloads for the final time.
Last updated