evilsocket / sauronLinks
A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.
☆228Updated 3 years ago
Alternatives and similar repositories for sauron
Users that are interested in sauron are comparing it to the libraries listed below
Sorting:
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- A fast and secure multi protocol honeypot.☆326Updated 3 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 3 years ago
- Signature based honeypot detector tool written in Golang☆108Updated 10 months ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- tool for generating wordlists or extending an existing one using mutations.☆391Updated this week
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Updated 5 months ago
- Signing-key abuse and update exploitation framework☆132Updated 8 months ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 4 years ago
- DEbian Cve REproducer Tool☆27Updated last month
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 4 years ago
- MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery☆56Updated this week
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆277Updated last week
- ☆55Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆137Updated this week
- ☆66Updated 3 years ago
- C2 Active Scanner☆59Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- Data visualization for blue teams☆126Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- NIST-based CVE lookup store and API powered by Rust.☆136Updated 4 months ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- TAPIR is a multi-user, client/server, incident response framework☆47Updated 3 years ago