0xN3utr0n / KanisLinks
Advanced threat detection solution for Linux.
☆35Updated 4 years ago
Alternatives and similar repositories for Kanis
Users that are interested in Kanis are comparing it to the libraries listed below
Sorting:
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- A rogue DNS detector☆23Updated last year
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- ☆50Updated 4 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Is this IP a C2 server?☆28Updated 5 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- ☆22Updated last year
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated 11 months ago
- Automated Payload Test Controller☆10Updated 8 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Tool to manage user privileges☆29Updated 5 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- Red Team C2 and Post Exploitation code☆36Updated 2 weeks ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago