0xN3utr0n / Kanis
Advanced threat detection solution for Linux.
☆36Updated 4 years ago
Alternatives and similar repositories for Kanis:
Users that are interested in Kanis are comparing it to the libraries listed below
- ssdeep cluster analysis for malware files☆31Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Is this IP a C2 server?☆28Updated 4 years ago
- PoC for CVE-2020-11651☆7Updated 4 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated this week
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 3 years ago
- CVE2020-0796 SMBv3 RCE☆61Updated 4 years ago
- Presentations from the CX Security Labs team☆33Updated 3 months ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Simplified go-cat agent for caldera☆10Updated last year
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- various slides and presentations I've worked on☆18Updated 10 months ago
- ☆50Updated 4 years ago
- ☆42Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A rogue DNS detector☆23Updated last year
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- Automatically perform advanced NTLM hash relay attacks☆14Updated 2 years ago
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- Proof of Concept for WatchGuard Authenticated Arbitrary File Read (CVE-2022-31749)☆10Updated 2 years ago