WhiteBeamSec / WhiteBeam
WhiteBeam: Transparent endpoint security
☆96Updated last year
Alternatives and similar repositories for WhiteBeam:
Users that are interested in WhiteBeam are comparing it to the libraries listed below
- YARI is an interactive debugger for YARA Language.☆88Updated last week
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆38Updated last year
- A forensic evidence acquirer☆85Updated 3 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆56Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆124Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆67Updated 2 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆71Updated 3 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 5 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- XOR Key Extractor☆49Updated 5 months ago
- Apfell Golang macOS/Linux/Windows implant☆88Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆45Updated last year
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆95Updated last year
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Updated 6 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆27Updated 2 years ago
- Python wrappers for mal_unpack☆35Updated last year
- A document tagging library☆29Updated last year