CobaltStrikeScan
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
Parse indicators of compromise (also known as "observables" or "network data" - e.g. urls, email addresses, etc) from text. Documentation (it's interactive!) I'm looking for sponsorship for this project. I have a number of improvements and helpful features I'd like to add and would appreciate some support as I invest this time and focus. If you use this project for in a commercial capacity and/or find it useful, please consider contributing even a small amount. Thanks!
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
Lists of sources and utilities to hunt, detect, and prevent evildoers.
A database of Tor exit nodes with their corresponding IP addresses and timestamps.
OpenIOC editor for building and manipulating threat intelligence data with support for various systems.
Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.
VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.