CobaltStrikeDetected
Memory malware detector
Detects potential Cobalt Strike malware by analyzing memory allocation patterns during code execution
40行代码检测到大部分CobaltStrike的shellcode
272 stars
8 watching
48 forks
Language: C++
last commit: over 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A tool to detect memory-based evasion techniques used in malware and rootkits | 711 |
| Detects malicious servers in network traffic by analyzing encoded byte patterns | 20 |
| Toolset to analyze and research malware and Cobalt Strike beacon behavior | 206 |
| A CobaltStrike profile repository containing metadata and information about the CobaltStrike malware | 39 |
| Detects and analyzes Cobalt Strike beacons by analyzing HTTP responses and extracting configuration information. | 266 |
| Automates CobaltStrike notification to WeChat via ServerChan | 93 |
| A Cobalt Strike beacon implementation in Rust for creating malicious network connections | 180 |
| Library for dissecting and parsing data related to Cobalt Strike exploits | 148 |
| A Cobalt Strike plugin for post-exploitation and privilege escalation tests | 1,494 |
| A script to simulate a Cobaltstrike connection | 130 |
| Automates CobaltStrike login notifications to Slack and Feishu. | 88 |
| A tool designed to bypass common anti-malware measures by loading malicious Cobalt Strike shellcodes into infected systems. | 121 |
| A collection of resources and documentation for Cobalt Strike 4.0 | 398 |
| A toolset to extract and analyze configurations from malware samples known as Cobalt Strike Beacons. | 148 |
| Exploits and tools for the MS17-010 vulnerability in Windows 7 x64 and Windows Server 2008 R2 | 418 |