CiscoCXSecurity / unix-auditView external linksLinks
Framework for generating audit commands for Unix security audits
☆66Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for unix-audit
Users that are interested in unix-audit are comparing it to the libraries listed below
Sorting:
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Tool for profiling heap usage and memory management☆27Oct 31, 2021Updated 4 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- Scan vulnerable drivers on Windows with loldrivers.io☆186Sep 11, 2023Updated 2 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 8 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆168Sep 7, 2024Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 8 months ago
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- 基于机器学习的Webshell检测工具☆12May 15, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- ☆12Jun 29, 2021Updated 4 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Playground for Race Condition attack☆24Mar 18, 2023Updated 2 years ago
- ☆120Mar 28, 2025Updated 10 months ago
- ☆91Dec 5, 2025Updated 2 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Dec 29, 2024Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85May 13, 2024Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago