cs-discovery
Traffic analyzer
Detects malicious servers in network traffic by analyzing encoded byte patterns
Detecting Cobalt Strike Team Servers on targets through traffic telemetry.
20 stars
4 watching
3 forks
Language: Python
last commit: 6 months ago cobalt-strikecobaltstrikecobaltstrike-detectioncommand-and-controlcsirtpythonthreat-huntingthreat-intelligence
Related projects:
Repository | Description | Stars |
---|---|---|
| Detects and analyzes Cobalt Strike beacons by analyzing HTTP responses and extracting configuration information. | 266 |
| Toolset to analyze and research malware and Cobalt Strike beacon behavior | 206 |
| Detects potential Cobalt Strike malware by analyzing memory allocation patterns during code execution | 272 |
| Library for dissecting and parsing data related to Cobalt Strike exploits | 148 |
| A Cobalt Strike plugin for post-exploitation and privilege escalation tests | 1,494 |
| An analysis project of Cobalt Strike C2 protocol in Python. | 67 |
| Analyzes web-based network traffic to detect malicious command and control servers using Squid proxy server and Spamhaus | 78 |
| A toolset to extract and analyze configurations from malware samples known as Cobalt Strike Beacons. | 148 |
| An instrument used to identify and exploit network proxy configurations and execute shellcode on compromised systems | 141 |
| Deciphers CobaltStrike Beacon configurations from various formats. | 1,028 |
| A Python script to exploit a Cobalt Strike vulnerability and perform a denial of service attack. | 103 |
| A Cobalt Strike beacon implementation in Rust for creating malicious network connections | 180 |
| A tool for integrating Cobalt Strike payloads with ScareCrow to evade antivirus detection and improve evasion capabilities. | 457 |
| Tools and scripts for analyzing and interacting with Cobalt Strike | 32 |
| A tool for detecting and responding to potential Cobalt Strike beacons using Extended Trace Record (ETW) tracing | 482 |