CobaltStrikeDetected
Memory malware detector
Detects potential Cobalt Strike malware by analyzing memory allocation patterns during code execution
40行代码检测到大部分CobaltStrike的shellcode
272 stars
8 watching
48 forks
Language: C++
last commit: over 4 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A tool to detect memory-based evasion techniques used in malware and rootkits | 711 |
| | Detects malicious servers in network traffic by analyzing encoded byte patterns | 20 |
| | Toolset to analyze and research malware and Cobalt Strike beacon behavior | 206 |
| | A CobaltStrike profile repository containing metadata and information about the CobaltStrike malware | 39 |
| | Detects and analyzes Cobalt Strike beacons by analyzing HTTP responses and extracting configuration information. | 266 |
| | Automates CobaltStrike notification to WeChat via ServerChan | 93 |
| | A Cobalt Strike beacon implementation in Rust for creating malicious network connections | 180 |
| | Library for dissecting and parsing data related to Cobalt Strike exploits | 148 |
| | A Cobalt Strike plugin for post-exploitation and privilege escalation tests | 1,494 |
| | A script to simulate a Cobaltstrike connection | 130 |
| | Automates CobaltStrike login notifications to Slack and Feishu. | 88 |
| | A tool designed to bypass common anti-malware measures by loading malicious Cobalt Strike shellcodes into infected systems. | 121 |
| | A collection of resources and documentation for Cobalt Strike 4.0 | 398 |
| | A toolset to extract and analyze configurations from malware samples known as Cobalt Strike Beacons. | 148 |
| | Exploits and tools for the MS17-010 vulnerability in Windows 7 x64 and Windows Server 2008 R2 | 418 |