evilsocket / sauronLinks
A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.
☆228Updated 3 years ago
Alternatives and similar repositories for sauron
Users that are interested in sauron are comparing it to the libraries listed below
Sorting:
- A fast and secure multi protocol honeypot.☆322Updated 2 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆160Updated last year
- Signature based honeypot detector tool written in Golang☆102Updated 5 months ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Signing-key abuse and update exploitation framework☆130Updated 3 months ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- TAPIR is a multi-user, client/server, incident response framework☆45Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 10 months ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆36Updated last week
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆124Updated this week
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆94Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- a common schema for internet-connected service discovery 🔎 📚☆19Updated last week
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Updated last year
- ☆66Updated 2 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Artifact collection tool for *nix systems☆210Updated last year
- File analysis and management framework.☆86Updated last year
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆268Updated last week
- ☆55Updated 10 months ago
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated 4 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- NIST-based CVE lookup store and API powered by Rust.☆132Updated last month