Loginsoft-LLC / Linux-Exploit-DetectionLinks
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
☆21Updated 2 years ago
Alternatives and similar repositories for Linux-Exploit-Detection
Users that are interested in Linux-Exploit-Detection are comparing it to the libraries listed below
Sorting:
- First iteration of ML based Feedback WAF☆59Updated last year
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- ☆44Updated 3 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆28Updated 2 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- An Adaptive Misuse Detection System☆46Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆66Updated last year
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 3 years ago
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Updated last year
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- Malware Analysis tools☆26Updated last year
- IoT Malware Similarity Analysis Platform☆45Updated 4 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Updated 2 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 8 months ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Updated last year
- Simple Latest CVE Collector Written in Python☆59Updated last year
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Everything related to YARA☆15Updated 4 months ago
- ☆42Updated 10 months ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- ☆116Updated 2 years ago