Beta versions of my software
☆271Mar 7, 2026Updated last month
Alternatives and similar repositories for Beta
Users that are interested in Beta are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Please no pull requests for this repository. Thanks!☆2,443Mar 16, 2026Updated last month
- ☆1,133Dec 19, 2023Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Hunts out CobaltStrike beacons and logs operator command output☆955Sep 4, 2024Updated last year
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆94May 22, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,407Nov 7, 2024Updated last year
- Windows kernel and user mode emulation.☆1,936Apr 8, 2026Updated last week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,746Jan 16, 2026Updated 3 months ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 7 months ago
- Quickly debug shellcode extracted during malware analysis☆633May 23, 2023Updated 2 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,737Updated this week
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,318Feb 14, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆1,290Jul 13, 2023Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆920Aug 19, 2021Updated 4 years ago
- High Octane Triage Analysis☆841Updated this week
- ☆451Aug 4, 2021Updated 4 years ago
- ☆552Dec 4, 2023Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,611Updated this week
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆273May 5, 2021Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆804Apr 1, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Modular malware analysis artifact collection and correlation framework☆55Apr 23, 2024Updated last year
- Interesting APT Report Collection And Some Special IOCs☆2,962Updated this week
- Windows Events Attack Samples☆2,549Jan 24, 2023Updated 3 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆129Sep 24, 2023Updated 2 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆161Oct 30, 2025Updated 5 months ago
- Volatility plugin for extracts configuration data of known malware☆494Dec 22, 2023Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- Project to decrypt and parse SSH traffic☆71Nov 12, 2020Updated 5 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆326Jul 5, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆372Dec 24, 2021Updated 4 years ago
- ☆152Jun 5, 2024Updated last year
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆153Jul 20, 2022Updated 3 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- .NET Project for Attacking vCenter☆558Nov 11, 2021Updated 4 years ago
- c2 traffic☆196Feb 6, 2023Updated 3 years ago
- YARA signature and IOC database for my scanners and tools☆2,917Updated this week