DidierStevens / BetaLinks
Beta versions of my software
☆264Updated 4 months ago
Alternatives and similar repositories for Beta
Users that are interested in Beta are comparing it to the libraries listed below
Sorting:
- Code and yara rules to detect and analyze Cobalt Strike☆271Updated 4 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆508Updated 3 years ago
- Plugins I've written for Volatility☆210Updated last year
- Setup scripts for my Malware Analysis VMs☆256Updated 3 years ago
- ☆452Updated 4 years ago
- Lnk Explorer Command line edition!!☆327Updated 9 months ago
- ☆1,111Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆584Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆917Updated 4 years ago
- Parses amcache.hve files, but with a twist!☆142Updated 9 months ago
- Threat Intel IoCs + bits and pieces of dark matter☆418Updated 4 months ago
- Cobalt Strike Beacon configuration extractor and parser.☆157Updated 4 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆293Updated 2 years ago
- RDP Bitmap Cache parser☆574Updated 8 months ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆337Updated 2 years ago
- Volatility plugins developed and maintained by the community☆367Updated 4 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆370Updated 2 weeks ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆426Updated 4 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 2 years ago
- Volatility plugin for extracts configuration data of known malware☆490Updated last year
- PCAP Samples for Different Post Exploitation Techniques☆367Updated 4 years ago
- ☆553Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆180Updated 3 months ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- IOC from articles, tweets for archives☆319Updated last year
- Live forensic artifacts collector☆171Updated last year
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago
- Evtx to Splunk ingestor☆15Updated 3 years ago
- Digital forensic acquisition tool for Windows based incident response.☆344Updated last year
- ☆211Updated 3 months ago