sominsong / NIMOSLinks
Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security
☆16Updated 2 years ago
Alternatives and similar repositories for NIMOS
Users that are interested in NIMOS are comparing it to the libraries listed below
Sorting:
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆28Updated 5 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆38Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- A collection of various exploits☆28Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆43Updated last year
- IoT Malware Similarity Analysis Platform☆45Updated 4 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Updated 3 years ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- ☆10Updated 5 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- ☆11Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated 2 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Updated 3 years ago
- ☆18Updated last year
- ☆11Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- ☆22Updated 2 years ago
- ☆17Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- ☆27Updated last year
- ☆12Updated 3 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 4 years ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- ☆48Updated 6 months ago
- BINARLY Research Tools and PoCs☆39Updated last year