WhiteBeamSec / WhiteBeamLinks
WhiteBeam: Transparent endpoint security
☆101Updated 2 years ago
Alternatives and similar repositories for WhiteBeam
Users that are interested in WhiteBeam are comparing it to the libraries listed below
Sorting:
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- YARI is an interactive debugger for YARA Language.☆89Updated 2 months ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 weeks ago
- Tools that trigger False Positive AV alerts☆53Updated 11 months ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆107Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆62Updated 4 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- PAM Backdoor☆33Updated 2 years ago
- Signing-key abuse and update exploitation framework☆131Updated 6 months ago
- Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumes☆53Updated 4 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- CLI tool to analyze PE files☆89Updated last year
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- A document tagging library☆31Updated 8 months ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- ☆28Updated 4 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 6 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago