0xN3utr0n / KanisLinks
Advanced threat detection solution for Linux.
☆35Updated 4 years ago
Alternatives and similar repositories for Kanis
Users that are interested in Kanis are comparing it to the libraries listed below
Sorting:
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆28Updated 4 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- ☆23Updated 2 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆104Updated 2 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- IoT and Operational Technology Honeypot☆104Updated 2 years ago
- Passive Security Tools Fingerprinting Framework☆75Updated 4 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Updated 2 years ago
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆49Updated 2 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated last year
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 5 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Updated 5 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆12Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 5 years ago
- volatility explorer☆92Updated 4 years ago
- Presentations from the CX Security Labs team☆34Updated 2 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆50Updated 5 years ago
- ☆24Updated 3 years ago
- Discord as a C2☆49Updated 4 years ago