OVALInterpreter / ovaldiLinks
OVAL Interpreter
☆14Updated 5 years ago
Alternatives and similar repositories for ovaldi
Users that are interested in ovaldi are comparing it to the libraries listed below
Sorting:
- Copy: Linux process monitoring (exec, fork, exit, set*uid, set*gid)☆31Updated 3 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173Updated last year
- a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志☆242Updated 6 years ago
- 这是一个基于 Cuckoo 开源版本的沙箱的修订版本, 该版本完全为了适配国内软件环境所打造☆77Updated 2 years ago
- 恶意脚本检测分类工具☆40Updated 4 years ago
- 收集了一些安全公司的博客☆145Updated 6 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆143Updated 5 years ago
- ATT&CK 框架图中文翻译版 原为安恒奖品,自我二次翻译,修改了一些小的翻译错误问题,自我保存即可☆265Updated 5 years ago
- Automatic reversed shell detecting and defensing☆51Updated 6 years ago
- 恶意软件分析套件☆18Updated 8 years ago
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆603Updated 4 years ago
- 一个HIDS agent端的demo☆17Updated 5 years ago
- 天御攻防实验室 - 威胁猎杀实战系列☆102Updated 6 years ago
- check_IP is to judge whether a IP is malicious based on open threat intelligence,基于开源威胁情报AlienVault,排查IP地址及域名的恶意性☆53Updated 7 years ago
- Sep0lkit's Blog☆15Updated 5 years ago
- ATT&CK实操☆373Updated 6 years ago
- CVE Data Analysis, CVE Monitor, CVE EXP Prediction Based on Deep Learning. 1999-2020年存量CVE数据分析、监控CVE增量更新、基于深度学习的CVE EXP预测和自动化推送☆175Updated 2 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Updated 6 years ago
- suricata源码分析和读书笔记☆25Updated 7 years ago
- SQL injection detection engine built on of SQL tokenizing and syntax analysis written in C☆61Updated 4 years ago
- HIDS全称是Host-based Intrusion Detection System,即基于主机型入侵检测系统,HIDS运行依赖这样一个原理:一个成功的入侵者一般而言都会留下他们入侵的痕迹。本人更倾向于通过记录主机的重要信息变更来发现入侵者。 本项目由两部分组成:一部分…☆106Updated 7 years ago
- linux下实现进程隐藏☆51Updated 9 years ago
- 威胁情报,恶意样本分析,开源Malware代码收集☆346Updated 5 years ago
- Used to detect patch information that has not been installed on the Windows system and outputs it to a file in order of specified severit…☆91Updated last month
- Your internal mediocrity is the moment when you lost the faith of being excellent. Just do it.☆62Updated last month
- 威胁情报采集系统☆33Updated 2 years ago
- datacon比赛方向三-攻击源与攻击者分析writeup☆93Updated 6 years ago
- APT学习指南(Advanced persistent threat learning Guide)☆219Updated 4 years ago
- Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)☆298Updated 10 months ago
- ☆57Updated 4 years ago