Bookmarks
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Filters

Untagged links
9 results tagged detection  ✕   ✕
OpenEDR - Open Source Endpoint Detection and Response https://www.openedr.com/
Fri 27 Jan 2023 09:35:41 PM PST archive.org

OpenEDR is a sophisticated, free, open source endpoint detection and response solution. It provides analytic detection with Mitre ATT&CK visibility for event correlation and root cause analysis of adversarial threat activity and behaviors in real time. This world-class endpoint telemetry platform is available to all cyber-security professionals, and every sized organization, to defend against threat actors and cyber criminals.

Github: https://github.com/ComodoSecurity/openedr

software opensource detection response cpp agents alerts sysadmin infosec
Insider Threat TTP Knowledge Base https://ctid.mitre-engenuity.org/our-work/insider-ttp-kb/
Thu 10 Mar 2022 03:21:49 PM PST archive.org

The Insider Threat Tactics, Techniques, and Procedures (TTP) Knowledge Base aims to advance our collective understanding of the technical mechanisms that insider threats have used. With this knowledge, Insider Threat Programs and Security Operations Centers will detect, mitigate, and emulate insider actions on IT systems to stop insider threats. Utilizing the Knowledge Base, cyber defenders across organizations will identify insider threat activity on IT systems and limit the damage. Capturing and sharing the Design Principles and Methodology for developing the Knowledge Base is a foundational step to establishing this community resource and enabling its broad adoption and ongoing development.

Github: https://github.com/center-for-threat-informed-defense/insider-threat-ttp-kb

infosec threats techniques detection procedures
Karneades/awesome-malware-persistence https://github.com/Karneades/awesome-malware-persistence
Tue 15 Feb 2022 04:18:15 PM PST archive.org

Malware persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

This is an extract with only links to the tools and resources taken from the main article about malware persistence.

awesome infosec malware techniques detection removal
Airguard: Air Tag tracking protection https://play.google.com/store/apps/details?id=de.seemoo.at_tracking_detection.release
Sun 02 Jan 2022 05:27:08 PM PST archive.org

The app periodically scans your surroundings for potential tracking devices, like AirTags or other Find My devices.

The AirTags and other Find My devices are simple, small and perfect to track Android users! Without tracking warnings, as integrated on iOS, anyone could try to track your behavior by placing an AirTag in your jacket, backpack or car.

With the app you can play a sound on AirTags and find it easily. Afterward, you can view at which locations the device has tracked you. For this we use background location access. All location data never leaves your device

If you no one is trying to track you, the app will never bother you.

mobile app android sniffer tracking detection surveillance
Introducing Amazon Brand Detector https://themarkup.org/amazons-advantage/2021/11/29/introducing-amazon-brand-detector
Thu 09 Dec 2021 06:08:36 PM PST archive.org

Amazon has registered more than 150 private-label brands with the U.S. Patent and Trademark Office and carries hundreds of thousands of items from these house brands on its site. A recent investigation by The Markup found that the online shopping behemoth often gives its own brands and exclusive products a leg up in search results over better-rated competitors. We also found Amazon is inconsistent in disclosing to shoppers that those products are Amazon-brand products or exclusives.

So we decided to add some transparency for Amazon shoppers. The Markup created a browser extension that identifies these products and makes their affiliation to Amazon clear.

amazon firefox chrome addon branding detection
GitHub - iitzco/faced https://github.com/iitzco/faced
Mon 02 Dec 2019 02:06:32 PM PST archive.org

A face detector (not facial identification) deep learning system based upon OpenCV and Tensorflow. Optimized for CPU, not GPU operation but does have a tensorflow-gpu switch available. Can even identify faces that aren't edge-on or partially obscured.

python module exocortex facialrecognition detection cli ai ml
How to Detect Hidden Cameras https://makezine.com/2018/06/29/detect-hidden-cameras/
Tue 10 Jul 2018 03:48:58 PM PDT archive.org

With their small size and ubiquitous use, we’ve become quite accostomed to commercial home-monitoring camera systems — so much so that they tend to fade into their settings, even when prominently placed up front and center. It’s an extension of camera-equipped-everything maneuvering us to take the constant recording of our lives for granted.

article cameras security detection counterintelligence surveillance howto
Snort :: Home Page http://www.snort.org/
Tue 20 Mar 2018 03:06:25 AM PDT archive.org
nids software monitoring intrusion infosec ids utilities detection ips traffic foss signatures security
imvirt @ Thomas Liske's Attic http://micky.ibh.net/~liske/imvirt.html
Tue 20 Mar 2018 12:25:51 AM PDT archive.org

A Perl script which analyzes the OS it's running on top of to determine whether or not it's virtualized, and if so which product(s) it's inside of. Uses multiple techniques (no red pills, I don't think) to gather information.

hvm xen kvm system analysis perl detection virtualization linux qemu virtualbox
4684 links, including 339 private
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn