MatheuZSecurity / detect-lkm-rootkit-cheatsheetLinks
Cheat sheet to detect and remove linux kernel rootkit
☆75Updated 11 months ago
Alternatives and similar repositories for detect-lkm-rootkit-cheatsheet
Users that are interested in detect-lkm-rootkit-cheatsheet are comparing it to the libraries listed below
Sorting:
- ☆71Updated 10 months ago
- Collection of codes focused on Linux rootkits☆188Updated last month
- ☆37Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆73Updated last week
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Make an Linux Kernel rootkit visible again.☆61Updated 9 months ago
- Linux #rootkit and #malware revealer☆28Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆75Updated 3 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆145Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆33Updated 11 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆139Updated 2 weeks ago
- Tools for analyzing EDR agents☆272Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- In-Memory Rootkit For Linux and BSD☆86Updated 3 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 9 months ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- ☆120Updated last year
- ☆132Updated 2 years ago
- ☆105Updated last year
- ☆83Updated last year
- ☆39Updated 11 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆37Updated last year
- Python tool to check rootkits in Windows kernel☆203Updated 3 months ago
- Some of my Malware Analysis writeups☆48Updated 2 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆129Updated 3 months ago
- ☆139Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆75Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆48Updated 2 weeks ago