sominsong / NIMOSLinks
Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security
☆16Updated 2 years ago
Alternatives and similar repositories for NIMOS
Users that are interested in NIMOS are comparing it to the libraries listed below
Sorting:
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated last year
- CVE-2024-53691☆11Updated 6 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆10Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 8 months ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 3 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆115Updated 5 months ago
- ☆13Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- ☆12Updated 9 months ago
- ☆16Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- ☆17Updated 5 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Updated 2 years ago
- ☆11Updated 9 months ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Open Source eBPF Malware Analysis Framework☆48Updated 9 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆22Updated last year