Issues
- 0
Hello, the attacker used a new technique to bypass SentinelOne, as customers and users hope to update the generic countermeasures as soon as possible to stop his bypass! https://github.com/helviojunior/hookchain
#27 opened by VulnerabilityReporting - 0
License incoherence
#26 opened by nyx0 - 2
Non-Standard Config XOR Key
#22 opened by drb-ra - 2
can't parser the hostheader
#24 opened by PromiseNoDieForever - 1
improper md5 calculation
#23 opened by kingofcurry - 3
UnicodeDecodeError / Punycode
#21 opened by ssnkhan - 2
Feature Request: Save Beacon
#9 opened by ssnkhan - 1
Does not work with x64.beacon
#19 opened by WHOLETTHEDOG-OUT - 2
unexpected output of recent NOBELIUM samples
#12 opened by zoomequipd - 1
MemoryError on big memory image
#15 opened by MariasStory - 1
Non existing file problem.
#16 opened by MariasStory - 0
communication_poc.py Forgot to deal with Port
#13 opened by ck00004 - 1
unexpected output of recent NOBELIUM samples
#11 opened by zoomequipd - 4
error line 38
#8 opened by NomisRenarc - 1
Invalid URL under C2Server
#6 opened by CrimsonGlory - 3
Feature Request: Extract Public Key
#5 opened by ssnkhan - 5
Does not work on stageless dll beacons
#4 opened by CyberKaizen - 5
Does it works with updated CS version?
#3 opened by kartone - 4