Beta versions of my software
☆269Jun 12, 2025Updated 8 months ago
Alternatives and similar repositories for Beta
Users that are interested in Beta are comparing it to the libraries listed below
Sorting:
- Please no pull requests for this repository. Thanks!☆2,418Feb 19, 2026Updated 2 weeks ago
- ☆1,132Dec 19, 2023Updated 2 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆94May 22, 2024Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Hunts out CobaltStrike beacons and logs operator command output☆950Sep 4, 2024Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 5 months ago
- Windows kernel and user mode emulation.☆1,868Mar 2, 2026Updated last week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,729Jan 16, 2026Updated last month
- ☆451Aug 4, 2021Updated 4 years ago
- ☆1,283Jul 13, 2023Updated 2 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆626May 23, 2023Updated 2 years ago
- Windows Events Attack Samples☆2,517Jan 24, 2023Updated 3 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆327Jul 5, 2021Updated 4 years ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,633Mar 1, 2026Updated last week
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,296Feb 14, 2026Updated 3 weeks ago
- Interesting APT Report Collection And Some Special IOCs☆2,929Updated this week
- Static based decoders for malware samples☆94Jul 27, 2020Updated 5 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆272May 5, 2021Updated 4 years ago
- bad stuffs by bad guys☆49Jul 28, 2022Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆922Aug 19, 2021Updated 4 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- ☆553Dec 4, 2023Updated 2 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 6 months ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- YARA signature and IOC database for my scanners and tools☆2,880Feb 5, 2026Updated last month
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,564Oct 31, 2025Updated 4 months ago
- A .NET Framework 4.0 Windows Agent☆531Feb 20, 2026Updated 2 weeks ago
- High Octane Triage Analysis☆822Updated this week
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆284Oct 29, 2024Updated last year
- AmsiScanBufferBypass using D/Invoke☆136Jun 17, 2021Updated 4 years ago
- Defences against Cobalt Strike☆1,296Jul 14, 2022Updated 3 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 5 months ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 2 years ago