Loginsoft-LLC / Linux-Exploit-DetectionLinks
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
☆21Updated 2 years ago
Alternatives and similar repositories for Linux-Exploit-Detection
Users that are interested in Linux-Exploit-Detection are comparing it to the libraries listed below
Sorting:
- First iteration of ML based Feedback WAF☆59Updated last year
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated last year
- Some of my rough notes for Docker threat detection☆48Updated 2 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- ☆20Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- ☆45Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 11 months ago
- Presentations from the CX Security Labs team☆35Updated 5 months ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- Everything related to YARA☆14Updated 3 months ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆107Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated 3 weeks ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆60Updated 2 years ago
- An Adaptive Misuse Detection System☆46Updated last year
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Interactive, dynamic, and realistic LLM honeypots☆71Updated 10 months ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆167Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated 2 years ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago