sominsong / NIMOSLinks
Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security
☆16Updated 2 years ago
Alternatives and similar repositories for NIMOS
Users that are interested in NIMOS are comparing it to the libraries listed below
Sorting:
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆37Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 4 years ago
- ☆10Updated 5 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆22Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- ☆12Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated last year
- Open Source eBPF Malware Analysis Framework☆53Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated 2 years ago
- ☆18Updated last year
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- ☆17Updated 2 years ago
- Framework for Adversarial Malware Evaluation.☆35Updated 8 months ago
- Command and Control Framework using powershell implants☆35Updated 5 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- An Adaptive Misuse Detection System☆46Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- ☆27Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 11 months ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Updated 3 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated 3 years ago
- Script to chain search parameters for MalwareBazaar☆12Updated 10 months ago