Overview

Whlle currently malleable profiles are based around the industry wide usage in tools like Cobalt Strike, we have merely re-implemented them and soon will have a C2lint type inbuilt validator into application so that these profiles are validated.

Later development will include working on the post exploitation modules communicating with the beacon, the network of post exploitation modules on multi host that result in clustering and similar attacks on XDR and MDR - these will be outlined in more detail but essentially malleable profiles are to be entirely extended, and are part of our development pipeline to incorporate into the overall mechanism, indeed some will be generated on the fly in the future.

Last updated