evilsocket / sauron
A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.
☆226Updated 2 years ago
Alternatives and similar repositories for sauron
Users that are interested in sauron are comparing it to the libraries listed below
Sorting:
- A fast and secure multi protocol honeypot.☆321Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 3 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆120Updated last week
- Signature based honeypot detector tool written in Golang☆93Updated last month
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆157Updated 2 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆155Updated 11 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆128Updated last year
- Threat Intel Platform for T-POTs☆147Updated last week
- NIST-based CVE lookup store and API powered by Rust.☆131Updated this week
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery☆44Updated last week
- A Passive SSH back-end and scanner.☆102Updated 2 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- Malware vulnerability intel tool for third-party attackers☆118Updated 6 months ago
- Shodan Monitoring integration for TheHive.☆130Updated 5 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Tool to analyze and detect MITM phishing toolkits on the web.☆81Updated 3 years ago
- PCAP visualization tool☆103Updated last year
- Signing-key abuse and update exploitation framework☆125Updated last month
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- tool for generating wordlists or extending an existing one using mutations.☆385Updated last month
- firedrill is a malware simulation harness for evaluating your security controls☆182Updated last year