CobaltStrikeScan Logo

CobaltStrikeScan

0
Free
Updated 11 March 2025
Visit Website

CobaltStrikeScan scans Windows process memory for evidence of DLL injection (classic or reflective injection) and/or performs a YARA scan on the target process' memory for Cobalt Strike v3 and v4 beacon signatures. It can also scan a file for Cobalt Strike beacons and parse their configuration. The tool can display the beacon's configuration if detected.

FEATURES

SIMILAR TOOLS

FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity

A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

Automatic YARA rule generator based on Koodous reports with limited false positives.

A repository of cybersecurity datasets and tools curated by @sooshie.

GroupSense Digital Risk Protection Services provides curated threat intelligence and attack surface monitoring through their Tracelight platform to help organizations prioritize and mitigate cyber threats.

A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

A python3 application for querying sites hosting publicly pasted data and scanning for sensitive information.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved