Immersive-Labs-Sec / SliverC2-Forensics
A collection of tools and detections for the Sliver C2 Frameworj
☆115Updated last year
Alternatives and similar repositories for SliverC2-Forensics:
Users that are interested in SliverC2-Forensics are comparing it to the libraries listed below
- Detect WFP filters blocking EDR communications☆85Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆254Updated last year
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆88Updated last year
- An interactive shell to spoof some LOLBins command line☆182Updated last year
- Detect EDR's exceptions by inspecting processes' loaded modules☆124Updated 11 months ago
- ☆36Updated 10 months ago
- Active C&C Detector☆152Updated last year
- Lateral Movement☆122Updated last year
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 6 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆129Updated 3 months ago
- Default Detections for EDR☆97Updated 11 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆158Updated 2 months ago
- A collection of tools, scripts and personal research☆125Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 9 months ago
- https://lolad-project.github.io/☆71Updated last month
- Finding secrets in kernel and user memory☆113Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆224Updated 11 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆198Updated 11 months ago
- Adversary Emulation Framework☆65Updated 6 months ago
- ☆182Updated 2 years ago
- ☆140Updated 2 months ago
- To audit the security of read-only domain controllers☆114Updated last year
- ☆107Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 5 months ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆158Updated 4 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆134Updated 6 months ago