Magentron / chkrootkit
This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit
☆233Updated 2 years ago
Alternatives and similar repositories for chkrootkit
Users that are interested in chkrootkit are comparing it to the libraries listed below
Sorting:
- Stable version of Unhide☆164Updated 5 months ago
- Kernel-Mode Rootkit Hunter☆369Updated 3 years ago
- Mirror of https://github.com/zeek/zeek☆175Updated 2 years ago
- Rootkit Hunter install script☆137Updated 11 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆477Updated 4 months ago
- Open Source Network Forensic Analysis Tool (NFAT)☆191Updated 4 years ago
- Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data☆264Updated last year
- The tool for updating your Suricata rules.☆270Updated last month
- linux rootkit adapted for 2.6 and 3.x☆209Updated 9 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆595Updated 4 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆650Updated 3 weeks ago
- Attack Detection☆1,355Updated 2 years ago
- The pattern matching swiss knife☆138Updated 5 years ago
- fireELF - Fileless Linux Malware Framework☆668Updated 6 years ago
- HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis an…☆733Updated 2 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆434Updated 5 years ago
- Awesome Honeypot Resource Collection. Including 250+ Honeypot tools, and 350+ posts about Honeypot.☆91Updated 5 years ago
- virtual honeypots☆370Updated last year
- Super Next generation Advanced Reactive honEypot☆463Updated 11 months ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆457Updated this week
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆186Updated 11 months ago
- repair corrupted pcap files☆216Updated 11 months ago
- An IDS (Couldn't find Snort on github when I wanted to fork)☆118Updated 13 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆435Updated 3 years ago
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆400Updated last year
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated 11 months ago
- ☆54Updated 10 months ago
- Modular file scanning/analysis framework☆619Updated 5 years ago