MatheuZSecurity / detect-lkm-rootkit-cheatsheetLinks
Cheat sheet to detect and remove linux kernel rootkit
☆70Updated 8 months ago
Alternatives and similar repositories for detect-lkm-rootkit-cheatsheet
Users that are interested in detect-lkm-rootkit-cheatsheet are comparing it to the libraries listed below
Sorting:
- Collection of codes focused on Linux rootkits☆150Updated 3 weeks ago
- ☆69Updated 7 months ago
- ☆37Updated 9 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆22Updated 8 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆69Updated 3 weeks ago
- Vibe Malware Triage - MCP server for static PE analysis.☆68Updated 3 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Make an Linux Kernel rootkit visible again.☆55Updated 6 months ago
- Powershell Linter☆81Updated last week
- The different ways to dump lsass☆116Updated 3 weeks ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Updated 6 months ago
- Tools for analyzing EDR agents☆249Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 7 months ago
- Retrieve inner payloads from Donut samples☆106Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated 3 weeks ago
- ☆19Updated 2 weeks ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- ☆37Updated last year
- Userland exec PoC to be used as attack vector technique☆85Updated 7 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- ☆113Updated last month
- A Repository to Track Anti-Forensic Techniques☆112Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated 5 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 5 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- ☆31Updated last year
- ☆134Updated 2 years ago
- In-Memory Rootkit For Linux and BSD☆80Updated last month