evilsocket / sauronLinks
A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.
☆230Updated 3 years ago
Alternatives and similar repositories for sauron
Users that are interested in sauron are comparing it to the libraries listed below
Sorting:
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- A fast and secure multi protocol honeypot.☆326Updated 3 years ago
- Signature based honeypot detector tool written in Golang☆106Updated 7 months ago
- NIST-based CVE lookup store and API powered by Rust.☆135Updated 2 months ago
- MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery☆51Updated this week
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆130Updated 3 weeks ago
- Signing-key abuse and update exploitation framework☆131Updated 6 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- DEbian Cve REproducer Tool☆27Updated 3 months ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Updated 2 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 9 months ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆274Updated last week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- A PoC ransomware sample to test out your ransomware response strategy.☆213Updated 7 months ago
- File analysis and management framework.☆90Updated 2 years ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆95Updated 2 years ago
- tool for generating wordlists or extending an existing one using mutations.☆389Updated 5 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated 2 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆112Updated 2 weeks ago
- IOCs published by Black Lotus Labs☆124Updated 3 weeks ago
- ☆55Updated last year