DidierStevens / Beta
Beta versions of my software
☆245Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Beta
- Code and yara rules to detect and analyze Cobalt Strike☆264Updated 3 years ago
- ☆1,024Updated 11 months ago
- Plugins I've written for Volatility☆198Updated 11 months ago
- PCAP Samples for Different Post Exploitation Techniques☆344Updated 3 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆364Updated 2 years ago
- Digital forensic acquisition tool for Windows based incident response.☆334Updated 6 months ago
- ☆192Updated last month
- c2 traffic☆187Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆481Updated 2 years ago
- IOC from articles, tweets for archives☆311Updated 11 months ago
- ☆294Updated 4 years ago
- Volatility plugin for extracts configuration data of known malware☆485Updated 11 months ago
- Live forensic artifacts collector☆160Updated 4 months ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆900Updated 3 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆417Updated 3 years ago
- Lnk Explorer Command line edition!!☆277Updated 5 months ago
- ☆130Updated 9 months ago
- Setup scripts for my Malware Analysis VMs☆245Updated 2 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆543Updated this week
- Signatures and IoCs from public Volexity blog posts.☆324Updated this week
- Volatility plugins developed and maintained by the community☆342Updated 3 years ago
- Automatically created C2 Feeds☆533Updated this week
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆573Updated 6 months ago
- simple YARA-based IOC scanner☆164Updated this week
- Parses amcache.hve files, but with a twist!☆121Updated 2 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆240Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆107Updated 7 months ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆167Updated 3 years ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆241Updated last year