strozfriedberg / cobaltstrike-config-extractor
Cobalt Strike Beacon configuration extractor and parser.
☆145Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for cobaltstrike-config-extractor
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆147Updated last month
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆122Updated 2 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆93Updated 11 months ago
- Load any Beacon Object File using Powershell!☆246Updated 2 years ago
- Active C&C Detector☆150Updated last year
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆241Updated last year
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆140Updated 3 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆311Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆220Updated 8 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- A collection of tools to interact with Microsoft Security Response Center API☆95Updated 10 months ago
- Blueteam operational triage registry hunting/forensic tool.☆142Updated last year
- Active C2 IoCs☆96Updated last year
- ☆222Updated 6 months ago
- Evtx to Splunk ingestor☆12Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- Yara Rules for Modern Malware☆67Updated 8 months ago
- JPCERT/CC public YARA rules repository☆103Updated 5 months ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆147Updated 2 years ago
- ☆181Updated 2 years ago
- ☆61Updated last month
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆167Updated 3 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆262Updated 3 years ago
- ☆85Updated 9 months ago
- Apply a filter to the events being reported by windows event logging☆261Updated 3 years ago
- ☆91Updated this week
- ☆21Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆159Updated 4 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated last year