Bash script to Check for malicious Cryptomining
☆38Aug 19, 2018Updated 7 years ago
Alternatives and similar repositories for minerchk
Users that are interested in minerchk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Code examples from recent blog posts by minerva labs.☆45Jan 26, 2019Updated 7 years ago
- Blazescan is a linux webserver malware scanning and incident response tool, with built in support for cPanel servers, but will run on any…☆60Nov 10, 2018Updated 7 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆108Mar 4, 2021Updated 5 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 9 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 6 years ago
- Python Project☆10Apr 11, 2018Updated 8 years ago
- Slides of mine.☆11Apr 19, 2024Updated 2 years ago
- Raspberry Pi powered door sensor that sends messages to a rocket chat channel☆18May 25, 2016Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆12Nov 24, 2022Updated 3 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- CMS VersionFinder script☆19Feb 18, 2021Updated 5 years ago
- Challenges for ImaginaryCTF 2023☆14Jul 29, 2023Updated 2 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- A Web Malware Scanner☆98Nov 26, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2019-0230 & s2-059 poc.☆35Aug 21, 2020Updated 5 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Jun 16, 2018Updated 7 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- Qt5 rsync front-end☆11Sep 14, 2017Updated 8 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆70Jan 19, 2023Updated 3 years ago
- Simple yet Powerfull Sapi 4/5 TTS Reader☆14Mar 24, 2019Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 7 years ago
- Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.☆17Sep 13, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆37Nov 15, 2024Updated last year
- Archive my journey and writeup on CTF Competition☆13Jul 31, 2025Updated 9 months ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- ☆21Nov 28, 2025Updated 5 months ago
- Machine Learning for Cyber Security☆27Sep 1, 2017Updated 8 years ago
- A list of bitcoin addresses being used in Ransomware and Sextortion Scams☆18Jul 4, 2021Updated 4 years ago
- ☆53Mar 4, 2019Updated 7 years ago