0xN3utr0n / Kanis
Advanced threat detection solution for Linux.
☆36Updated 4 years ago
Alternatives and similar repositories for Kanis:
Users that are interested in Kanis are comparing it to the libraries listed below
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated 3 weeks ago
- ssdeep cluster analysis for malware files☆31Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Sources code extracted from malwares for analysis☆36Updated last year
- Work in Progress repo☆14Updated 5 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Updated 5 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- ☆50Updated 4 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Updated 3 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- ☆22Updated last year
- This is a concept poc of command and control server implemented over blockchain☆51Updated 5 years ago
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆46Updated last year
- QuasarRAT analysis tools and research report☆25Updated last year
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- various slides and presentations I've worked on☆18Updated 11 months ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated last month
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆56Updated 2 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 3 months ago
- Tool to manage user privileges☆28Updated 5 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago