WhiteBeamSec / WhiteBeam
WhiteBeam: Transparent endpoint security
☆100Updated last year
Alternatives and similar repositories for WhiteBeam:
Users that are interested in WhiteBeam are comparing it to the libraries listed below
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆127Updated last year
- YARI is an interactive debugger for YARA Language.☆87Updated 2 months ago
- A forensic evidence acquirer☆86Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 3 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 5 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Updated 6 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- easy-to-use payload hosting☆266Updated 2 years ago
- Python wrappers for mal_unpack☆35Updated last year
- Linpmem is a linux memory acquisition tool☆78Updated 10 months ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- ☆61Updated 8 months ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 3 months ago
- Yara Rules for Modern Malware☆73Updated last year
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- My Python Cookiecutter project template☆30Updated 2 years ago
- C# User Simulation☆32Updated 2 years ago
- A tool to attack ARP☆13Updated 3 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Keep it secret, keep it safe☆77Updated last month
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- Apfell Golang macOS/Linux/Windows implant☆88Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated last month
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago