From 5a7a7c658f08ed384c8723826450a0ac1bb639fe Mon Sep 17 00:00:00 2001 From: fabacab Date: Sun, 28 Nov 2021 10:51:32 -0500 Subject: [PATCH] Add CobaltStrikeScan. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index b25aebb..1ff2cad 100644 --- a/README.md +++ b/README.md @@ -430,6 +430,7 @@ See also [drduh/macOS-Security-and-Privacy-Guide](https://github.com/drduh/macOS See also [awesome-windows#security](https://github.com/Awesome-Windows/Awesome#security) and [awesome-windows-domain-hardening](https://github.com/PaulSec/awesome-windows-domain-hardening). +- [CobaltStrikeScan](https://github.com/Apr4h/CobaltStrikeScan) - Scan files or process memory for Cobalt Strike beacons and parse their configuration. - [HardenTools](https://github.com/securitywithoutborders/hardentools) - Utility that disables a number of risky Windows features. - [NotRuler](https://github.com/sensepost/notruler) - Detect both client-side rules and VBScript enabled forms used by the [Ruler](https://github.com/sensepost/ruler) attack tool when attempting to compromise a Microsoft Exchange server. - [Sandboxie](https://www.sandboxie.com/) - Free and open source general purpose Windows application sandboxing utility.