0xN3utr0n / KanisLinks
Advanced threat detection solution for Linux.
☆35Updated 4 years ago
Alternatives and similar repositories for Kanis
Users that are interested in Kanis are comparing it to the libraries listed below
Sorting:
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- ssdeep cluster analysis for malware files☆30Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- ☆50Updated 4 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆21Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- A rogue DNS detector☆23Updated last year
- Automated Payload Test Controller☆10Updated 7 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 2 months ago
- Work in Progress repo☆14Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last week
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 5 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Sources code extracted from malwares for analysis☆36Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago