BinaryDefense / beacon-fronting
A simple command line program to help defender test their detections for network beacon patterns and domain fronting
☆65Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for beacon-fronting
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- ☆41Updated 7 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- ☆37Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆43Updated last year
- ☆25Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- Automatic detection engineering technical state compliance☆50Updated 4 months ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Carbon Black Response IR tool☆53Updated 3 years ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Active C2 IoCs☆96Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- An Ansible role for installing Cobalt Strike.☆74Updated 3 months ago
- C# User Simulation☆33Updated 2 years ago
- Slides and materials for conference presentations☆11Updated last year
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆67Updated 3 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- ☆41Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- Continuous kerberoast monitor☆44Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆34Updated last year
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Look into EDR events from network☆23Updated 7 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week