Magentron / chkrootkit
This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit
☆220Updated last year
Related projects ⓘ
Alternatives and complementary repositories for chkrootkit
- Kernel-Mode Rootkit Hunter☆360Updated 2 years ago
- Stable version of Unhide☆130Updated 8 months ago
- linux rootkit adapted for 2.6 and 3.x☆204Updated 8 years ago
- fireELF - Fileless Linux Malware Framework☆657Updated 5 years ago
- Suricata and Snort IDS rule and pcap testing system☆449Updated 2 weeks ago
- Mirror of https://github.com/zeek/zeek☆167Updated last year
- Open Source Network Forensic Analysis Tool (NFAT)☆182Updated 4 years ago
- ☆54Updated 4 months ago
- The tool for updating your Suricata rules.☆254Updated 4 months ago
- Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data☆258Updated last year
- Repository of modules and signatures contributed by the community☆323Updated last year
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆249Updated 3 years ago
- repair corrupted pcap files☆206Updated 5 months ago
- a summary of linux rootkits published on GitHub☆166Updated 4 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆175Updated 5 months ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆432Updated 5 years ago
- Sample Rootkit for Linux☆390Updated 3 months ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆453Updated 4 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆633Updated 3 weeks ago
- This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMn…☆260Updated last year
- The pattern matching swiss knife☆137Updated 4 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆163Updated 5 years ago
- Suricata rules for network anomaly detection☆153Updated 2 months ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆772Updated 8 months ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆430Updated last week
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆390Updated 8 years ago
- GitHub mirror of the Linux Kernel's audit repository☆139Updated 2 weeks ago
- Malware Configuration And Payload Extraction☆747Updated 2 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆420Updated 3 years ago
- Generic Low Interaction Honeypot☆244Updated 5 months ago