Loginsoft-LLC / Linux-Exploit-DetectionLinks
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
☆21Updated 2 years ago
Alternatives and similar repositories for Linux-Exploit-Detection
Users that are interested in Linux-Exploit-Detection are comparing it to the libraries listed below
Sorting:
- Some of my rough notes for Docker threat detection☆48Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- ☆42Updated 8 months ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- Presentations from the CX Security Labs team☆35Updated 4 months ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- ☆45Updated 3 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆59Updated 2 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Updated last year
- Interactive, dynamic, and realistic LLM honeypots☆69Updated 9 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Everything related to YARA☆14Updated 3 months ago
- An Adaptive Misuse Detection System☆46Updated last year
- Core A2P2V functionality (command line based)☆68Updated last year
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Memory Scaner☆64Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago