Loginsoft-LLC / Linux-Exploit-DetectionLinks
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
☆21Updated 2 years ago
Alternatives and similar repositories for Linux-Exploit-Detection
Users that are interested in Linux-Exploit-Detection are comparing it to the libraries listed below
Sorting:
- First iteration of ML based Feedback WAF☆59Updated last year
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 7 months ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- ☆44Updated 3 years ago
- Presentations from the CX Security Labs team☆35Updated 6 months ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆28Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- Slides and materials for conference presentations☆11Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- YaraScanner is a file pattern-matching tool based on YARA rules.☆60Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Updated 3 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- ☆42Updated 9 months ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year