DidierStevens / BetaLinks
Beta versions of my software
☆265Updated 5 months ago
Alternatives and similar repositories for Beta
Users that are interested in Beta are comparing it to the libraries listed below
Sorting:
- Code and yara rules to detect and analyze Cobalt Strike☆271Updated 4 years ago
- Setup scripts for my Malware Analysis VMs☆257Updated 3 years ago
- Lnk Explorer Command line edition!!☆329Updated 10 months ago
- Plugins I've written for Volatility☆212Updated last year
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆295Updated 2 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆509Updated 3 years ago
- ☆1,117Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆917Updated 4 years ago
- Parses amcache.hve files, but with a twist!☆144Updated 10 months ago
- RDP Bitmap Cache parser☆578Updated 9 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆584Updated last year
- ☆453Updated 4 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆157Updated 2 weeks ago
- PCAP Samples for Different Post Exploitation Techniques☆368Updated 4 years ago
- ☆555Updated last year
- Threat Intel IoCs + bits and pieces of dark matter☆421Updated 2 weeks ago
- Live forensic artifacts collector☆173Updated last year
- Digital forensic acquisition tool for Windows based incident response.☆346Updated last year
- Volatility plugins developed and maintained by the community☆369Updated 4 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆180Updated 4 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆257Updated 2 years ago
- Evtx to Splunk ingestor☆15Updated 3 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆337Updated 2 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆428Updated 4 years ago
- ☆212Updated this week
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆370Updated last month
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆127Updated 3 years ago
- c2 traffic☆192Updated 2 years ago
- IOC from articles, tweets for archives☆319Updated last year