beacon-fronting
Beacon simulator
A command line tool to simulate network beacon patterns and domain fronting for testing detection systems
A simple command line program to help defender test their detections for network beacon patterns and domain fronting
66 stars
6 watching
11 forks
Language: Go
last commit: about 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A Go-based implementation of CobaltStrike's Beacon protocol for reverse engineering and protocol analysis purposes. | 1,159 |
| A project that explores the use of beacon strikes in cobalt strike beacons to evade detection | 86 |
| A proof-of-concept project demonstrating how to mask Beacon's payload execution in Cobalt Strike while executing a user-provided BOF. | 110 |
| A collection of compiled beacon object files from the CobaltStrike platform. | 101 |
| A utility to generate malicious network traffic patterns and evaluate security controls. | 1,271 |
| Tool to compare IP addresses or hostnames to threat intelligence feeds and detect potential security threats. | 138 |
| A tool designed to detect and respond to potential security threats on Linux and Windows systems. | 1,007 |
| A tool to simulate a Cobalt Strike beacon connection packet by parsing the payload and extracting RSA public key | 78 |
| A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 |
| A tool used to detect and analyze malicious beacon activity in memory using Go programming language | 148 |
| A tool for detecting and responding to potential Cobalt Strike beacons using Extended Trace Record (ETW) tracing | 482 |
| A collection of beacon object files designed to be used in a remote access tool like Cobalt Strike. | 170 |
| A simulation tool for modeling wildland fire spread, using C++ and Python | 37 |
| A toolset for creating and automating customized security events to simulate realistic scenarios for testing and training | 998 |
| Automates testing of cybersecurity detection and response capabilities in a controlled network environment | 202 |