fox-it / cisco-ios-xe-implant-detection
Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)
☆37Updated last year
Alternatives and similar repositories for cisco-ios-xe-implant-detection:
Users that are interested in cisco-ios-xe-implant-detection are comparing it to the libraries listed below
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Linux #rootkit and #malware revealer☆24Updated 8 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- ShellSweeping the evil.☆52Updated 10 months ago
- create a "simulated internet" cyber range environment☆16Updated 3 weeks ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆116Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 11 months ago
- ☆18Updated 3 weeks ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Living off the False Positive!☆35Updated 2 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated last month
- Yara Rules for Modern Malware☆77Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆23Updated 2 years ago
- PowerShell Script Analyzer☆68Updated last year
- Kerberoast Detection Script☆30Updated 5 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- ☆24Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 5 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- A home for detection content developed by the delivr.to team☆68Updated 2 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆35Updated last week
- Detection rule validation☆41Updated last year
- ☆37Updated last year
- ☆15Updated 3 years ago