Magentron / chkrootkit
This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit
☆224Updated 2 years ago
Alternatives and similar repositories for chkrootkit:
Users that are interested in chkrootkit are comparing it to the libraries listed below
- Mirror of https://github.com/zeek/zeek☆174Updated 2 years ago
- Rootkit Hunter install script☆136Updated 11 years ago
- Stable version of Unhide☆148Updated 3 months ago
- Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data☆262Updated last year
- Kernel-Mode Rootkit Hunter☆366Updated 3 years ago
- This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMn…☆270Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆471Updated 2 months ago
- virtual honeypots☆368Updated last year
- Open Source Network Forensic Analysis Tool (NFAT)☆188Updated 4 years ago
- The tool for updating your Suricata rules.☆266Updated 3 months ago
- fireELF - Fileless Linux Malware Framework☆662Updated 5 years ago
- linux rootkit adapted for 2.6 and 3.x☆208Updated 9 years ago
- DNS-Shell is an interactive Shell over DNS channel☆524Updated 4 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆391Updated 8 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆645Updated 3 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆538Updated last year
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- ☆54Updated 9 months ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago
- Volatility profiles for Linux and Mac OS X☆323Updated 2 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆395Updated last year
- Sandbox for automated Linux malware analysis.☆477Updated last year
- simple YARA-based IOC scanner☆169Updated last month
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆449Updated 3 weeks ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆432Updated 5 years ago
- Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's☆274Updated 4 years ago
- a summary of linux rootkits published on GitHub☆172Updated 4 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆185Updated 10 months ago
- Web Application Honeypot☆573Updated 8 months ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago