Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
☆21Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-Exploit-Detection
Users that are interested in Linux-Exploit-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆16Jan 23, 2022Updated 4 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆15Apr 22, 2025Updated last year
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Jan 22, 2022Updated 4 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Nuclei template generator for WordPress plugins☆23Apr 22, 2024Updated 2 years ago
- ☆45Dec 2, 2025Updated 4 months ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Waffle is a library for integrating a Web Application Firewall (WAF) into Go applications.☆18Updated this week
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 7 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆56May 1, 2024Updated last year
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- Source code of paper "EPScan: Automated Detection of Excessive RBAC Permissions in Kubernetes Applications"☆16May 14, 2025Updated 11 months ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- For BambooFox☆14Sep 25, 2016Updated 9 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆32Aug 21, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- Simple C++ Reverse Shell☆12Nov 22, 2022Updated 3 years ago
- ☆10Mar 3, 2021Updated 5 years ago
- Snooze - Log aggregation and alerting☆10Sep 19, 2025Updated 7 months ago
- Geographical Information Science Tutorial and Practice course in UCAS☆13Dec 12, 2021Updated 4 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆19Jun 12, 2020Updated 5 years ago
- Vulnerable application for security issues demo☆18Jan 18, 2019Updated 7 years ago