All Projects → cisagov → Ansible Role Cobalt Strike

cisagov / Ansible Role Cobalt Strike

Licence: cc0-1.0
An Ansible role for installing Cobalt Strike.

Projects that are alternatives of or similar to Ansible Role Cobalt Strike

K8s Digitalocean Terraform
Deploy latest Kubernetes cluster on DigitalOcean using Terraform
Stars: ✭ 33 (-23.26%)
Mutual labels:  hcl
Ansible Phoenix
[Unmaintained] Develop and deploy a Phoenix app using Ansible!
Stars: ✭ 37 (-13.95%)
Mutual labels:  ansible-role
Ansible Kvm
Stars: ✭ 40 (-6.98%)
Mutual labels:  ansible-role
Ansible Role Android Sdk
Install Android SDK tools and packages, headless, with ansible.
Stars: ✭ 34 (-20.93%)
Mutual labels:  ansible-role
Ansible Influxdb
Ansible Galaxy InfluxDB Role
Stars: ✭ 36 (-16.28%)
Mutual labels:  ansible-role
Karch
A Terraform module to create and maintain Kubernetes clusters on AWS easily, relying entirely on kops
Stars: ✭ 38 (-11.63%)
Mutual labels:  hcl
Rancher Tf Mc
Stars: ✭ 33 (-23.26%)
Mutual labels:  hcl
Terraform Aws Cloudwatch
Terraform module which creates Cloudwatch resources on AWS
Stars: ✭ 41 (-4.65%)
Mutual labels:  hcl
Terraform Examples
Terraform Examples
Stars: ✭ 37 (-13.95%)
Mutual labels:  hcl
Hcloud K8s
Hetzner Kubernetes Cluster Installation with Private Networking
Stars: ✭ 40 (-6.98%)
Mutual labels:  hcl
Terraform Aws Ecs Fargate
Terraform module which creates ECS Fargate resources on AWS.
Stars: ✭ 35 (-18.6%)
Mutual labels:  hcl
Terraform Aws Redshift
Terraform module which creates Redshift resources on AWS
Stars: ✭ 36 (-16.28%)
Mutual labels:  hcl
Dcos Up
Launch DC/OS on AWS with Terraform and Consul
Stars: ✭ 38 (-11.63%)
Mutual labels:  hcl
Terraform Reference
Terraform reference / skel Control Repo for building for building multi-tier services
Stars: ✭ 33 (-23.26%)
Mutual labels:  hcl
Terraform Aws Jenkins Ha Agents
A terraform module for a highly available Jenkins deployment.
Stars: ✭ 41 (-4.65%)
Mutual labels:  hcl
Terraform Google Log Export
This module allows you to create log exports at the project, folder, or organization level.
Stars: ✭ 33 (-23.26%)
Mutual labels:  hcl
Ansible Debian Bootstrap
Ansible bootstrap role for Debian/Devuan/Ubuntu/Kali Linux/Raspbian servers
Stars: ✭ 37 (-13.95%)
Mutual labels:  ansible-role
Tb Gcp
Tranquility Base - The cloud landing zone
Stars: ✭ 42 (-2.33%)
Mutual labels:  hcl
Doact
A Terraform module for hosting your own runner for CI/CD on Digital Ocean to run jobs in your GitHub Actions workflows. 🚀
Stars: ✭ 42 (-2.33%)
Mutual labels:  hcl
Terraform Gcp Kubernetes Traefik
Little example of how to deploy a gke cluster with terraform and use traefik as ingress controller
Stars: ✭ 39 (-9.3%)
Mutual labels:  hcl

ansible-role-cobalt-strike

GitHub Build Status Total alerts Language grade: Python

An Ansible role for installing Cobalt Strike.

Pre-requisites

In order to execute the Molecule tests for this Ansible role in GitHub Actions, a build user must exist in AWS. The accompanying Terraform code will create the user with the appropriate name and permissions. This only needs to be run once per project, per AWS account. This user can also be used to run the Molecule tests on your local machine.

Before the build user can be created, the following profile must exist in your AWS credentials file:

  • cool-terraform-backend

The easiest way to set up that profile is to use our aws-profile-sync utility. Follow the usage instructions in that repository before continuing with the next steps. Note that you will need to know where your team stores their remote profile data in order to use aws-profile-sync.

To create the build user, follow these instructions:

cd terraform
terraform init --upgrade=true
terraform apply

Once the user is created you will need to update the repository's secrets with the new encrypted environment variables. This should be done using the terraform-to-secrets tool available in the development guide. Instructions for how to use this tool can be found in the "Terraform IAM Credentials to GitHub Secrets" section. of the Project Setup README.

If you have appropriate permissions for the repository you can view existing secrets on the appropriate page in the repository's settings.

Requirements

Requires that a Java implementation be installed.

Role Variables

  • bucket-name - The name of the AWS S3 bucket where the Cobalt Strike tarball and license files are stored. Defaults to cisa-cool-third-party-production.
  • tarball_object_name - The name of the AWS S3 object that is the Cobalt Strike tarball. Defaults to cobaltstrike.tgz.
  • license_object_name - The name of the AWS S3 object that is the Cobalt Strike license. Defaults to cobaltstrike.license.

Dependencies

None.

Example Playbook

Here's how to use it in a playbook:

- hosts: teamservers
  become: yes
  become_method: sudo
  roles:
    - cobalt_strike

Contributing

We welcome contributions! Please see CONTRIBUTING.md for details.

License

This project is in the worldwide public domain.

This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the CC0 1.0 Universal public domain dedication.

All contributions to this project will be released under the CC0 dedication. By submitting a pull request, you are agreeing to comply with this waiver of copyright interest.

Author Information

Shane Frasier - [email protected]

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].