0xN3utr0n / KanisLinks
Advanced threat detection solution for Linux.
☆36Updated 5 years ago
Alternatives and similar repositories for Kanis
Users that are interested in Kanis are comparing it to the libraries listed below
Sorting:
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- QuasarRAT analysis tools and research report☆28Updated 2 years ago
- ☆23Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Updated 6 years ago
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆29Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Passive Security Tools Fingerprinting Framework☆75Updated 4 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 5 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- ☆26Updated 3 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated last year
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- volatility explorer☆92Updated 5 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 2 months ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- ☆49Updated 5 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆42Updated 2 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 10 months ago