Search
Keyword: linux
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system.
This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other malware. It uses the system's central processing unit (...
* indicates a new version of an existing rule Deep Packet Inspection Rules: HP Intelligent Management Center Dbman 1010213 - HPE Intelligent Management Center 'dbman' RestartDB Command Injection Vulnerability (CVE-2017-5816) Ma...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Advanced Message Queuing Protocol (AMQP) 1011585* - SolarWinds Network Performance Monitor Insecure Deserialization Vulnerabilities (CVE-2022-36957 and...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ceph Messenger Client 1011911* - Linux Kernel Buffer Overflow Vulnerability (CVE-2023-44466) Splunk Enterprise 1011912* - Splunk Enterprise Privileg...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Microsoft Office 1008801 - Microsoft Office Memory Corruption Vulnerability (CVE-2017-11884) NTP Server Linux 1008320 - Network Time Protocol Daemon ...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ceph Messenger Client 1011911 - Linux Kernel Buffer Overflow Vulnerability (CVE-2023-44466) Elastic Kibana And Elasticsearch 1011909 - Elastic Kiba...
* indicates a new version of an existing rule Deep Packet Inspection Rules: CentOS Web Panel 1011887* - Control Web Panel Command Injection Remote Code Execution Vulnerability (CVE-2023-42123) NTP Server Linux 1009492* - NT...
* indicates a new version of an existing rule Deep Packet Inspection Rules: Fluent Bit HTTP 1012052 - Fluent Bit Memory Corruption Vulnerability (CVE-2024-4323) Nextgen Mirth Connect 1012008* - Nextgen Mirth Connect Insecure Des...
This backdoor executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.
SHELLSHOCK is capable of launching distributed denial-of-service (DDoS) attacks and also it is capable to do brute force logins.It can execute the following commands on compromised system: UDP - Perform UDP flooding TCP - Perform TCP flooding LOLNOGT...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor may be hosted on a website and run when a user accesses the said website.
This backdoor may be hosted on a website and run when a user accesses the said website.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This is a Fast SYN Scanner that uses libnet and libpcap , which require root level access. It scans a given netblock on a specified port, using the specified interface with some type of speed setting value. A certain command may be used in this tool....
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user, effectively compromising the affected system.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the system's central processing unit (CPU) and/or graphical processing u...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform its intended routine.
