WhiteBeamSec / WhiteBeam
WhiteBeam: Transparent endpoint security
☆101Updated 2 years ago
Alternatives and similar repositories for WhiteBeam:
Users that are interested in WhiteBeam are comparing it to the libraries listed below
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- YARI is an interactive debugger for YARA Language.☆88Updated 4 months ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 3 months ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆128Updated last year
- A forensic evidence acquirer☆86Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Python wrappers for mal_unpack☆36Updated last year
- Sandfly Linux Stealth Rootkit Decloaking Utility☆99Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- Small Rust programs that do weird things☆30Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 3 years ago
- Keep it secret, keep it safe☆77Updated 3 months ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 5 years ago
- ☆31Updated 3 years ago
- A document tagging library☆30Updated last month
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- ☆24Updated 3 years ago
- CLI tool to analyze PE files☆88Updated 7 months ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Ingest openldap data into bloodhound☆80Updated 4 years ago