Beacon_re
Beacon evasion technique
A project that explores the use of beacon strikes in cobalt strike beacons to evade detection
86 stars
4 watching
18 forks
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
kyleavery/aceldr | A Cobalt Strike memory scanner evasion technique using code obfuscation and encryption to evade detection. | 878 |
3lp4tr0n/beaconhunter | A tool for detecting and responding to potential Cobalt Strike beacons using Extended Trace Record (ETW) tracing | 481 |
wbglil/cs_decrypt | A collection of Python scripts for decrypting and processing encrypted data related to Cobalt Strike security vulnerability analysis | 140 |
gnxbr/fully-undetectable-techniques | A collection of low-level techniques and tools to evade detection in software | 368 |
binarydefense/beacon-fronting | A command line tool to simulate network beacon patterns and domain fronting for testing detection systems | 65 |
0xsp-srd/mortar | A toolset designed to evade detection by security products and execute malware safely | 1,410 |
rkervella/carbonmonoxide | A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. | 23 |
passthehashbrowns/bofmask | A proof-of-concept project demonstrating how to mask Beacon's payload execution in Cobalt Strike while executing a user-provided BOF. | 108 |
ed1s0nz/cool | A tool designed to bypass antivirus software and evade detection. | 689 |
noone-hub/beacon.dll | Reverse engineering and modification of beacon.dll for 64-bit compatibility | 136 |
akkuman/evileye | A tool used to detect and analyze malicious beacon activity in memory using Go programming language | 149 |
ccob/beaconeye | A tool designed to detect and monitor malicious beacon activity from CobaltStrike, providing insights into operator command output. | 885 |
b1tg/cobaltstrike-beacon-rust | A Cobalt Strike beacon implementation in Rust for creating malicious network connections | 177 |
epi052/rustdsplit | Re-implements a method to bypass signature-based AV detection by splitting a file into two halves and modifying one byte in each half to evade detection. | 35 |
cobalt-strike/beacon_health_check | An aggressor script that tracks the health status of beacons based on their note field | 138 |