Get Custom Pricing for the Offensive Security Suite

Request a quote for our security testing bundle of Core Impact, Cobalt Strike, and Outflank Security Tooling (OST) 

Advanced red teamers can maximize their engagements with this testing suite that features Core Impact, an automated pen testing solution, Cobalt Strike, a post-exploitation adversary simulation tool, and OST, an expertly curated offensive security toolset highlighting evasive capabilities.  

Security teams can deploy these tools independently, but their interoperability enables coordinated operations across platforms. Exclusive features enhance these combined solutions with specialized offensive capabilities unavailable elsewhere.

Combining Core Impact, Cobalt Strike, and OST enables testers to: 

  • Increase Pen Testing Efficiency: Automate basic and routine pen tests to focus on complex tasks
  • Emulate Advanced Threats: Model embedded attackers with a powerful post-exploitation payload
  • Manage Every Part of the Attack Chain: Utilize OST’s multi-faceted toolkit to assist everything from initial access to data exfiltration 

This suite also offers exclusive access to Cobalt Strike Research Labs specialized tools and tradecraft for advanced operations and access to Cobalt Strike and Core Impact operator training programs. 

Start the Purchase Process 

Since Core Impact, Cobalt Strike, and OST are powerful security tools that use the same techniques as threat actors for adversary simulation, we limit the purchase of these products to only responsible buyers. This is determined through a complete vetting of prospective users, which is also required by various government entities to maintain security. To get this process started, simply complete the form. 

What is Included in the Offensive Security Suite?

Cobalt Strike Research Labs

Cobalt Strike Research Labs delivers exclusive developed capabilities focused on evasion and emerging attack techniques not available with single product purchases. Research output integrates seamlessly, deploying within existing Cobalt Strike workflows.

Additionally, users gain access to a comprehensive knowledge base and private Slack channel for connecting with other red teamers. 

Operator Training 

The Offensive Security Suite includes operator training for both Cobalt Strike (CSCO) and Core Impact (CICO), developed with industry experts to guide users from fundamental concepts through advanced workflows. 

Each module combines instructional content with hands-on labs for practical skill development. The self-paced format benefits both newcomers and experienced practitioners looking to strengthen their operational foundations across both platforms.

Tools in the Offensive Security Suite

With these tools, you can determine the strength of your security, identifying gaps that may be putting critical assets at risk.   

Core Impact Features Include:

  • Multi-Vector Testing - Exploit vulnerabilities to prioritize threats across the IT infrastructure with network, web-application, and client-side tests.
  • Rapid Penetration Tests - Use step-by-step wizards to perform tasks like information gathering, attack and penetration, privilege escalation, and clean up.
  • Test Modules - Build and save different tasks for testing and retesting efforts that are tailored to your environment.
  • Reporting - Guide remediation efforts with automated report generation, which can also be used to prove adherence to industry best practices and government regulations. 

Cobalt Strike Features Include:

  • Post-Exploitation - Simulate an advanced attack in a compromised environment using Beacon, a payload that performs post-exploitation tasks like moving laterally, escalating privileges, and achieving persistence.
  • Covert Communication - Use Beacon’s malleable network indicators to load a C2 profile to look like different malware or blend in with normal traffic.
  • Flexible Framework - Tailor Cobalt Strike by modifying built-in scripts, writing your own, or utilizing an extension from the user-driven Community Kit.
  • Collaboration - Use the Red Team server to share data and communicate with your team in real-time during an engagement. 

OST Features Include:

  • Evolving Tool Set - Keep up to date with ongoing updates incorporating new offensive security techniques and procedures.
  • Antivirus and EDR Evasion - Stay under the radar with tools focused on helping bypass defensive measures and detection.
  • Multi-Phase Approach - Get coverage for every step of the attacker kill chain, from initial breach to final exfiltration.