Cobalt Strike Beacon configuration extractor and parser.
☆160Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for cobaltstrike-config-extractor
Users that are interested in cobaltstrike-config-extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Jan 11, 2023Updated 3 years ago
- ☆1,134Dec 19, 2023Updated 2 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆951Sep 4, 2024Updated last year
- Detect and respond to Cobalt Strike beacons using ETW.☆516Jul 15, 2022Updated 3 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆451Aug 4, 2021Updated 4 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated last year
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Extendable payload obfuscation and delivery framework☆146Nov 4, 2022Updated 3 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆114Aug 23, 2021Updated 4 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆272May 5, 2021Updated 4 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 3 weeks ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆187Mar 17, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆483Jul 12, 2023Updated 2 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- Defences against Cobalt Strike☆1,297Jul 14, 2022Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 5 years ago
- Aims to identify sleeping beacons☆664Jan 25, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 8 months ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆152Sep 3, 2020Updated 5 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups