MatheuZSecurity / detect-lkm-rootkit-cheatsheetLinks
Cheat sheet to detect and remove linux kernel rootkit
☆74Updated 10 months ago
Alternatives and similar repositories for detect-lkm-rootkit-cheatsheet
Users that are interested in detect-lkm-rootkit-cheatsheet are comparing it to the libraries listed below
Sorting:
- ☆70Updated 8 months ago
- Collection of codes focused on Linux rootkits☆177Updated last month
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ☆37Updated last year
- Make an Linux Kernel rootkit visible again.☆59Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- ☆39Updated 10 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆23Updated 9 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated this week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆70Updated 5 months ago
- Tools for analyzing EDR agents☆264Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated 7 months ago
- ☆82Updated 11 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆72Updated 2 months ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- A Repository to Track Anti-Forensic Techniques☆113Updated 2 years ago
- Linux #rootkit and #malware revealer☆28Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆70Updated last year
- Malware Analysis tools☆26Updated last year
- ☆114Updated 3 months ago
- ☆69Updated 2 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 5 months ago
- Powershell Linter☆84Updated 3 weeks ago
- ☆105Updated last year
- Python tool to check rootkits in Windows kernel☆201Updated 2 months ago
- ☆132Updated 2 years ago
- ☆119Updated last year
- Userland exec PoC to be used as attack vector technique☆93Updated last month
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago