sominsong / NIMOS
Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security
☆16Updated last year
Alternatives and similar repositories for NIMOS:
Users that are interested in NIMOS are comparing it to the libraries listed below
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- kubernetes rootkit☆31Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 9 months ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Practical Data-Only Attack Generation☆39Updated 10 months ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- PoC code and tools for Black Hat USA 2024☆21Updated 8 months ago
- 快速对自己项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新☆20Updated 3 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆41Updated last month
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆59Updated 3 months ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆40Updated last year
- POC for Phantom Attack☆82Updated 2 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆41Updated 2 months ago
- ☆16Updated 5 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 4 months ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- A framework for identifying vulnerabilities in VS Code extensions☆17Updated 9 months ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆57Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 3 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- ☆15Updated last year
- Simple WebSocket fuzzer☆32Updated last year
- My conference presentations and Materials for them.☆32Updated 2 years ago
- CVE-2024-53691☆11Updated 3 months ago
- ☆14Updated 2 years ago