DidierStevens / BetaLinks
Beta versions of my software
☆260Updated 2 months ago
Alternatives and similar repositories for Beta
Users that are interested in Beta are comparing it to the libraries listed below
Sorting:
- Code and yara rules to detect and analyze Cobalt Strike☆270Updated 4 years ago
- Plugins I've written for Volatility☆208Updated last year
- Detect and respond to Cobalt Strike beacons using ETW.☆508Updated 3 years ago
- Lnk Explorer Command line edition!!☆320Updated 7 months ago
- ☆452Updated 4 years ago
- Setup scripts for my Malware Analysis VMs☆256Updated 3 years ago
- Parses amcache.hve files, but with a twist!☆141Updated 7 months ago
- ☆1,097Updated last year
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆287Updated 2 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆414Updated 2 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆583Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆914Updated 4 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆155Updated 4 years ago
- c2 traffic☆189Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆255Updated 2 years ago
- Live forensic artifacts collector☆171Updated last year
- Volatility plugins developed and maintained by the community☆365Updated 4 years ago
- ☆548Updated last year
- PCAP Samples for Different Post Exploitation Techniques☆365Updated 4 years ago
- Volatility plugin for extracts configuration data of known malware☆491Updated last year
- Digital forensic acquisition tool for Windows based incident response.☆344Updated last year
- IOC from articles, tweets for archives☆315Updated last year
- RDP Bitmap Cache parser☆566Updated 7 months ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆175Updated 2 months ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆181Updated last month
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆426Updated 4 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Updated 2 years ago
- Evtx to Splunk ingestor☆15Updated 3 years ago