Framework for generating audit commands for Unix security audits
☆66Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for unix-audit
Users that are interested in unix-audit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Scan vulnerable drivers on Windows with loldrivers.io☆189Sep 11, 2023Updated 2 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆171Sep 7, 2024Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆67Feb 1, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 10 months ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆42Jun 10, 2025Updated 10 months ago
- Pushes Sysmon Configs☆91Jun 11, 2021Updated 4 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆92Dec 5, 2025Updated 5 months ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆185May 19, 2025Updated 11 months ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tool for profiling heap usage and memory management☆27Oct 31, 2021Updated 4 years ago
- ☆16Apr 21, 2023Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 10 months ago
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆267Dec 6, 2025Updated 5 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆58Dec 29, 2024Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Playground for Dasel.☆11Nov 30, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- A Golang CLI for the MITRE ATT&CK Framework☆14Apr 28, 2025Updated last year
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆22Sep 30, 2022Updated 3 years ago
- ☆20May 30, 2025Updated 11 months ago
- Some of my rough notes for Docker threat detection☆51Aug 26, 2023Updated 2 years ago
- Python module to analyze devices connected to the router and alert accordingly.☆19Aug 16, 2023Updated 2 years ago
- A simulated WiFi capture the flag setup☆18Nov 1, 2022Updated 3 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detectio…☆19Jun 22, 2023Updated 2 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- ☆116Jun 8, 2023Updated 2 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆272Sep 14, 2023Updated 2 years ago