Immersive-Labs-Sec / SliverC2-Forensics
A collection of tools and detections for the Sliver C2 Frameworj
☆115Updated last year
Alternatives and similar repositories for SliverC2-Forensics:
Users that are interested in SliverC2-Forensics are comparing it to the libraries listed below
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆251Updated last year
- Detect WFP filters blocking EDR communications☆85Updated last year
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆88Updated last year
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- ☆185Updated 11 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆303Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 5 months ago
- Tools for analyzing EDR agents☆214Updated 7 months ago
- An interactive shell to spoof some LOLBins command line☆181Updated 11 months ago
- shared samples from #dailyphish and/or #apt tweets☆37Updated last week
- ☆36Updated 9 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆181Updated 10 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆152Updated last month
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆156Updated 3 months ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆124Updated 10 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 8 months ago
- A collection of tools, scripts and personal research☆120Updated 6 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- Extract C2 Traffic☆248Updated last month
- Active C&C Detector☆152Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- Cobalt Strike Beacon configuration extractor and parser.☆149Updated 3 years ago
- Analyse MSI files for vulnerabilities☆121Updated 4 months ago
- Kill AV/EDR leveraging BYOVD attack☆334Updated last year
- ☆13Updated 2 years ago
- Default Detections for EDR☆96Updated 10 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 4 months ago
- ShellSweeping the evil.☆161Updated last month
- PoCs of RCEs against open source C2 servers☆53Updated 3 months ago
- ☆182Updated 2 years ago