evilsocket / sauron
A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.
☆224Updated 2 years ago
Alternatives and similar repositories for sauron:
Users that are interested in sauron are comparing it to the libraries listed below
- A fast and secure multi protocol honeypot.☆317Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- Malware vulnerability intel tool for third-party attackers☆116Updated 5 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 2 years ago
- Signing-key abuse and update exploitation framework☆125Updated 2 weeks ago
- WhiteBeam: Transparent endpoint security☆100Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆120Updated 3 weeks ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆56Updated 2 years ago
- Artifact collection tool for *nix systems☆203Updated last year
- A PoC ransomware sample to test out your ransomware response strategy.☆210Updated last week
- LOKI2 - Simple IOC and YARA Scanner☆89Updated 8 months ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆93Updated last year
- tool for generating wordlists or extending an existing one using mutations.☆385Updated 2 weeks ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆116Updated 2 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Threat Intel Platform for T-POTs☆145Updated last week
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆153Updated 10 months ago
- CLI tools for forensic investigation of Windows artifacts☆327Updated 5 months ago
- Signature based honeypot detector tool written in Golang☆89Updated last month
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- ☆112Updated 3 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 2 months ago
- C2 Active Scanner☆55Updated 10 months ago
- a curated, categorised collection of useful projects 👨👩👧☆110Updated 3 weeks ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year