Tools for identifying, assessing, and mitigating cyber threats across organizations. Task: Windows SecurityExplore 2 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.
Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.