DidierStevens / Beta
Beta versions of my software
☆249Updated last year
Alternatives and similar repositories for Beta:
Users that are interested in Beta are comparing it to the libraries listed below
- Code and yara rules to detect and analyze Cobalt Strike☆265Updated 3 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆489Updated 2 years ago
- ☆1,050Updated last year
- Plugins I've written for Volatility☆202Updated last year
- c2 traffic☆188Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆906Updated 3 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆255Updated last year
- PowerShell script for deobfuscating encoded PowerShell scripts☆425Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- IOC from articles, tweets for archives☆313Updated last year
- Cobalt Strike Beacon configuration extractor and parser.☆152Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆374Updated 2 years ago
- Volatility plugins developed and maintained by the community☆359Updated 4 years ago
- PCAP Samples for Different Post Exploitation Techniques☆356Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆165Updated 3 weeks ago
- Lnk Explorer Command line edition!!☆299Updated 3 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- ☆130Updated last year
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆323Updated last year
- Tool Analysis Result Sheet☆348Updated 7 years ago
- Parses amcache.hve files, but with a twist!☆131Updated 3 months ago
- volatility explorer☆91Updated 4 years ago
- Digital forensic acquisition tool for Windows based incident response.☆338Updated 11 months ago
- ☆302Updated 4 years ago
- Live forensic artifacts collector☆166Updated 9 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆246Updated 2 years ago
- Automatically created C2 Feeds☆595Updated this week
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- ☆544Updated last year
- Volatility plugin for extracts configuration data of known malware☆486Updated last year