sominsong / NIMOSLinks
Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security
☆16Updated 2 years ago
Alternatives and similar repositories for NIMOS
Users that are interested in NIMOS are comparing it to the libraries listed below
Sorting:
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆31Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- ☆10Updated 4 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- ☆18Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 10 months ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Updated 3 years ago
- Open Source eBPF Malware Analysis Framework☆53Updated last year
- ☆17Updated 5 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆167Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 2 years ago
- ☆27Updated 11 months ago
- Decrypt encrypted SonicOSX firmware images☆18Updated 8 months ago
- ☆25Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆116Updated 7 months ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated 2 years ago
- ☆44Updated 4 years ago
- Symantec EDR Internals☆28Updated 4 years ago
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆21Updated 2 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 10 months ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago