Category: Defense

Rootkit Detection

ved-ebpf: Kernel Exploit and Rootkit Detection using eBPF

VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF VED (Vault Exploit Defense)-eBPF leverages eBPF (extended Berkeley Packet Filter) to implement runtime kernel security monitoring and exploit detection for Linux systems....

Phishing Domain Finder

antisquat: An AI-Powered Phishing Domain Finder

AntiSquat AntiSquat leverages AI techniques such as natural language processing (NLP), large language models (ChatGPT) and more to empower detection of typosquatting and phishing domains. What sets AntiSquat apart Large...

monitoring eBPF programs

ebpfmon: tool for monitoring eBPF programs

ebpfmon ebpfmon is a tool for monitoring eBPF programs. It is designed to be used with bpftool from the Linux kernel. ebpfmon is a TUI (terminal UI) application written in Go that allows...

Web Application Firewall Project

Web Application Firewall (WAF) Comparison Project

Web Application Firewall (WAF) Comparison Project This project repository contains testing datasets and tools to compare WAF efficacy in the two most important categories: Security Coverage (True Positive Rate) –...

Detect Infections

melee: Detect Infections in MySQL Instances

MELEE: A Tool to Detect Ransomware Infections in MySQL Instances Attackers are abusing MySQL instances for conducting nefarious operations on the Internet. The cybercriminals are targeting exposed MySQL instances and...

signature-based detection malware

dynmx: Signature-based detection of malware

dynmx dynmx (spoken dynamics) is a signature-based detection approach for behavioural malware features based on Windows API call sequences. In a simplified way, you can think of dynmx as a sort of YARA...