WhiteBeamSec / WhiteBeamLinks
WhiteBeam: Transparent endpoint security
☆101Updated 2 years ago
Alternatives and similar repositories for WhiteBeam
Users that are interested in WhiteBeam are comparing it to the libraries listed below
Sorting:
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- YARI is an interactive debugger for YARA Language.☆90Updated 4 months ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆107Updated 2 years ago
- Data exfiltration and covert communication tool☆39Updated 3 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- C# User Simulation☆33Updated 3 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- Command and Control that uses NTP as the transport protocol.☆22Updated 3 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated last month
- Detect and remove the presence of canary tokens☆24Updated 2 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated 2 years ago
- PAM Backdoor☆33Updated 2 years ago
- SNIcat☆128Updated 4 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- CLI tool to analyze PE files☆90Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Slack C2bot that executes commands and returns the output.☆47Updated 2 years ago
- A document tagging library☆32Updated 9 months ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago