Loading...
CobaltStrikeScan scans Windows process memory for evidence of DLL injection (classic or reflective injection) and/or performs a YARA scan on the target process' memory for Cobalt Strike v3 and v4 beacon signatures. It can also scan a file for Cobalt Strike beacons and parse their configuration. The tool can display the beacon's configuration if detected.
Common questions about CobaltStrikeScan including features, pricing, alternatives, and user reviews.
CobaltStrikeScan is Scan files or process memory for Cobalt Strike beacons and parse their configuration.. It is a Security Operations solution designed to help security teams with YARA, Windows Security, Dll Injection.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
Get strategic cybersecurity insights in your inbox
A collection of YARA rules specifically designed for forensic investigations and malware analysis, providing pattern matching capabilities for files and memory dumps.
VolatilityBot automates memory dump analysis by extracting executables, detecting code injections, and performing automated malware scanning using YARA and ClamAV.
A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.