DidierStevens / BetaLinks
Beta versions of my software
☆268Updated 6 months ago
Alternatives and similar repositories for Beta
Users that are interested in Beta are comparing it to the libraries listed below
Sorting:
- Code and yara rules to detect and analyze Cobalt Strike☆272Updated 4 years ago
- Lnk Explorer Command line edition!!☆331Updated 11 months ago
- Plugins I've written for Volatility☆214Updated 2 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆303Updated 2 years ago
- Setup scripts for my Malware Analysis VMs☆257Updated 3 years ago
- Parses amcache.hve files, but with a twist!☆146Updated 11 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆515Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆584Updated last year
- RDP Bitmap Cache parser☆620Updated 11 months ago
- Cobalt Strike Beacon configuration extractor and parser.☆157Updated last month
- ☆1,124Updated 2 years ago
- Live forensic artifacts collector☆172Updated last year
- Volatility plugins developed and maintained by the community☆374Updated 4 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆425Updated last week
- Evtx to Splunk ingestor☆15Updated 3 years ago
- ☆554Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆920Updated 4 years ago
- ☆453Updated 4 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆181Updated 6 months ago
- Digital forensic acquisition tool for Windows based incident response.☆347Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 2 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆429Updated 4 years ago
- c2 traffic☆192Updated 2 years ago
- Windows symbol tables for Volatility 3☆91Updated last year
- Volatility plugin for extracts configuration data of known malware☆493Updated 2 years ago
- ☆212Updated 3 weeks ago
- Prefetch Explorer Command Line☆274Updated 11 months ago
- IOC from articles, tweets for archives☆319Updated 2 years ago
- PCAP Samples for Different Post Exploitation Techniques☆368Updated 4 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆129Updated 3 years ago