DidierStevens / Beta
Beta versions of my software
☆253Updated last week
Alternatives and similar repositories for Beta
Users that are interested in Beta are comparing it to the libraries listed below
Sorting:
- Code and yara rules to detect and analyze Cobalt Strike☆266Updated 4 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆494Updated 2 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆578Updated last year
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆261Updated last year
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆424Updated 4 years ago
- IOC from articles, tweets for archives☆313Updated last year
- c2 traffic☆188Updated 2 years ago
- Digital forensic acquisition tool for Windows based incident response.☆339Updated last year
- Parses amcache.hve files, but with a twist!☆132Updated 4 months ago
- Live forensic artifacts collector☆166Updated 10 months ago
- Lnk Explorer Command line edition!!☆301Updated 4 months ago
- ☆1,053Updated last year
- ☆200Updated this week
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆324Updated last year
- ☆130Updated last year
- Plugins I've written for Volatility☆203Updated last year
- Cobalt Strike Beacon configuration extractor and parser.☆152Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆375Updated 3 years ago
- RDP Bitmap Cache parser☆531Updated 3 months ago
- ☆302Updated 4 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆906Updated 3 years ago
- ☆276Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆166Updated 2 years ago
- Volatility plugins developed and maintained by the community☆362Updated 4 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- ☆428Updated 2 years ago
- PCAP Samples for Different Post Exploitation Techniques☆357Updated 4 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆247Updated 2 years ago