CERN-CERT / activity_klog
Ccollection of Linux loadable kernel modules aimed to logs any user action
☆25Updated 6 years ago
Alternatives and similar repositories for activity_klog:
Users that are interested in activity_klog are comparing it to the libraries listed below
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- please use https://github.com/fireeye/vivisect instead☆16Updated 8 months ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- ☆32Updated 9 months ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Abusing the FreeBSD MAC framework for rootkits☆11Updated 7 years ago
- Fuzzer☆43Updated 10 years ago
- ☆10Updated 3 months ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Basic file metadata gathering script☆21Updated this week
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Network detector for Winnti malware☆20Updated 7 years ago
- Extract GUIDs from .NET assemblies☆21Updated 8 years ago