WhiteBeamSec / WhiteBeamLinks
WhiteBeam: Transparent endpoint security
☆101Updated 2 years ago
Alternatives and similar repositories for WhiteBeam
Users that are interested in WhiteBeam are comparing it to the libraries listed below
Sorting:
- YARI is an interactive debugger for YARA Language.☆88Updated this week
- A document tagging library☆30Updated 2 months ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Keep it secret, keep it safe☆77Updated 4 months ago
- A forensic evidence acquirer☆86Updated 4 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Detect and remove the presence of canary tokens☆22Updated last year
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆128Updated last year
- Sandfly Linux Stealth Rootkit Decloaking Utility☆100Updated 2 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 6 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Python wrappers for mal_unpack☆36Updated last year
- PAM Backdoor☆28Updated 2 years ago
- XOR Key Extractor☆50Updated 10 months ago
- A tool to attack ARP☆15Updated 4 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Raw socket library/framework for red team events☆34Updated 2 years ago
- A tool suite for use during system assessments.☆35Updated 3 weeks ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- Linux rust keylogger☆16Updated last year
- CLI tool to analyze PE files☆88Updated 9 months ago