cobaltstrike-config-extractor
Beacon parser
A toolset to extract and analyze configurations from malware samples known as Cobalt Strike Beacons.
Cobalt Strike Beacon configuration extractor and parser.
148 stars
9 watching
11 forks
Language: Python
last commit: over 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Deciphers CobaltStrike Beacon configurations from various formats. | 1,028 |
| Library for dissecting and parsing data related to Cobalt Strike exploits | 148 |
| Detects and analyzes Cobalt Strike beacons by analyzing HTTP responses and extracting configuration information. | 266 |
| A Cobalt Strike beacon implementation in Rust for creating malicious network connections | 180 |
| Historical metadata of Cobalt Strike Beacon attacks | 125 |
| Toolset to analyze and research malware and Cobalt Strike beacon behavior | 206 |
| A tool for detecting and parsing CobaltStrike beacon configuration from files or process memory. | 902 |
| A Python script to exploit a Cobalt Strike vulnerability and perform a denial of service attack. | 103 |
| A tool designed to send fake beacons to a CobaltStrike server as part of a defensive measure | 366 |
| Tool to hunt and mine Cobalt Strike beacons from internet-connected services | 164 |
| A Go implementation of a CobaltStrike beacon with support for multiple platforms and various communication protocols | 397 |
| Detects malicious servers in network traffic by analyzing encoded byte patterns | 20 |
| A CobaltStrike profile repository containing metadata and information about the CobaltStrike malware | 39 |
| Tools to bypass cobaltstrike beacon config scan vulnerability | 84 |
| A tool for detecting and responding to potential Cobalt Strike beacons using Extended Trace Record (ETW) tracing | 482 |