Aldenar / salt-malware-sources
Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analysis of other infected machines
☆13Updated 4 years ago
Alternatives and similar repositories for salt-malware-sources:
Users that are interested in salt-malware-sources are comparing it to the libraries listed below
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 8 months ago
- vyos based isolation of networks☆11Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Custom semgrep rules registry☆11Updated 2 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆22Updated 2 months ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 3 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆80Updated 4 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆22Updated 2 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- go reversing helpers for binaryninja☆28Updated last year
- Technical Notes☆16Updated 7 years ago
- Open YARA scan- and search engine☆20Updated 3 weeks ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 10 months ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 7 months ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 6 years ago