01Automates XOR decryption for Cobalt Strike version 3 and 4 beacons
02Generates YARA rules and network signatures for proactive threat hunting
03Parses Type-Length-Value (TLV) configuration entries for C2 identification
04Extracts malleable C2 profile settings to reveal traffic masking techniques
05Identifies unique watermarks to assist in threat actor attribution
064,121 GitHub stars