Hestat / minerchkView external linksLinks
Bash script to Check for malicious Cryptomining
☆38Aug 19, 2018Updated 7 years ago
Alternatives and similar repositories for minerchk
Users that are interested in minerchk are comparing it to the libraries listed below
Sorting:
- Code examples from recent blog posts by minerva labs.☆45Jan 26, 2019Updated 7 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Blazescan is a linux webserver malware scanning and incident response tool, with built in support for cPanel servers, but will run on any…☆60Nov 10, 2018Updated 7 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23May 6, 2016Updated 9 years ago
- Some security scripts i used☆15Jan 25, 2021Updated 5 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- ☆22Feb 16, 2023Updated 2 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- A docker image for the Gophish web application☆18Jul 10, 2019Updated 6 years ago
- scanver☆21Nov 13, 2018Updated 7 years ago
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- Network visualizer tool built using Processing☆24Jun 23, 2021Updated 4 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 6 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- TweetTrace is a free and open-source Chrome extension that records tweets you visit, providing seamless search and filtering functionalit…☆23Aug 22, 2024Updated last year
- ☆53Mar 4, 2019Updated 6 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆107Mar 4, 2021Updated 4 years ago