CobaltStrikeScan Logo

CobaltStrikeScan

0
Free
Visit Website

CobaltStrikeScan scans Windows process memory for evidence of DLL injection (classic or reflective injection) and/or performs a YARA scan on the target process' memory for Cobalt Strike v3 and v4 beacon signatures. It can also scan a file for Cobalt Strike beacons and parse their configuration. The tool can display the beacon's configuration if detected.

FEATURES

ALTERNATIVES

Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.

A container of PCAP captures mapped to the relevant attack tactic

A Python library for handling TAXII v1.x Messages and invoking TAXII Services.

A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.

A cybersecurity tool with online demo, mailing list, and multiple installation methods.

Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.

A simple, self-contained modular host-based IOC scanner for incident responders.

A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved