fox-it / cobaltstrike-beacon-dataLinks
Open Dataset of Cobalt Strike Beacon metadata (2018-2022)
☆133Updated 3 years ago
Alternatives and similar repositories for cobaltstrike-beacon-data
Users that are interested in cobaltstrike-beacon-data are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Beacon configuration extractor and parser.☆160Updated 3 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆184Updated 7 months ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆145Updated 2 years ago
- Active C2 IoCs☆99Updated 3 years ago
- My conference presentations☆87Updated 2 months ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Updated this week
- YARA rule analyzer to improve rule quality and performance☆109Updated last week
- AdHoc solutions☆48Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 5 years ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Updated 7 months ago
- Simple PowerShell script to enable process scanning with Yara.☆98Updated 3 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Updated 5 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 3 years ago
- Fraktal's Ransomware Emulator☆101Updated last year
- Lazarus analysis tools and research report☆57Updated 2 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆182Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- ShellSweeping the evil.☆53Updated last year
- Active C&C Detector☆155Updated 2 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆272Updated 4 years ago
- Default Detections for EDR☆97Updated last year
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆36Updated 4 years ago
- Yara Rules for Modern Malware☆78Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Updated 2 years ago
- ☆131Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year