Code and yara rules to detect and analyze Cobalt Strike
☆272May 5, 2021Updated 4 years ago
Alternatives and similar repositories for cobaltstrike
Users that are interested in cobaltstrike are comparing it to the libraries listed below
Sorting:
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆922Aug 19, 2021Updated 4 years ago
- ☆1,131Dec 19, 2023Updated 2 years ago
- Defences against Cobalt Strike☆1,296Jul 14, 2022Updated 3 years ago
- ☆451Aug 4, 2021Updated 4 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated 11 months ago
- Hunts out CobaltStrike beacons and logs operator command output☆950Sep 4, 2024Updated last year
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- Automatically created C2 Feeds☆666Updated this week
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆133Mar 28, 2022Updated 3 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Oct 14, 2022Updated 3 years ago
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 6 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆785Feb 22, 2026Updated last week
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆186Jun 23, 2025Updated 8 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year
- ☆1,283Jul 13, 2023Updated 2 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- Collection of beacon BOF written to learn windows and cobaltstrike☆362Feb 24, 2023Updated 3 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Aug 5, 2022Updated 3 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆160Oct 30, 2025Updated 4 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆516Jul 15, 2022Updated 3 years ago
- CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理 、结合SysCall进行注入、原生端口转发、关ETW等一系列功能☆731Sep 1, 2021Updated 4 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,098Jun 25, 2024Updated last year
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated 11 months ago
- Windows kernel and user mode emulation.☆1,860Updated this week
- Repository of YARA rules made by Trellix ATR Team☆625Mar 18, 2025Updated 11 months ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- Small and convenient C2 tool for Windows targets☆612Mar 8, 2022Updated 3 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,915Feb 24, 2026Updated last week
- generate CobaltStrike's cross-platform payload☆2,542Nov 20, 2023Updated 2 years ago
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago