All Projects → redcanaryco → public-research

redcanaryco / public-research

Licence: MIT license
Public repository for Red Canary Research

Programming Languages

c
50402 projects - #5 most used programming language
assembly
5116 projects
Makefile
30231 projects

Projects that are alternatives of or similar to public-research

ios-unstripped-kexts
Unstripped iOS kernel extensions and more. More coming soon.
Stars: ✭ 43 (+53.57%)
Mutual labels:  security-research
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+207.14%)
Mutual labels:  security-research
cisco ios research
No description or website provided.
Stars: ✭ 22 (-21.43%)
Mutual labels:  security-research
advisories
Security advisories published by Enable Security
Stars: ✭ 23 (-17.86%)
Mutual labels:  security-research
sanskari-proxy
A proxy for security researchers outside India to access Indian government websites without resorting to shady VPNs.
Stars: ✭ 25 (-10.71%)
Mutual labels:  security-research
jaws
Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blog post
Stars: ✭ 204 (+628.57%)
Mutual labels:  security-research
SyscallExtractorAnalyzer
This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes
Stars: ✭ 19 (-32.14%)
Mutual labels:  security-research
dioterms
Open-source vulnerability disclosure policy templates.
Stars: ✭ 48 (+71.43%)
Mutual labels:  security-research

Public Research

Welcome to Red Canary's public research repository!

Table of Contents

ATT&CK Technique Prevalence

Red Canary publishes an annual Threat Detection Report that is an in-depth look at the most prevalent ATT&CK® techniques designed to help you and your team focus on what matters most.

This machine-readable data illustrates how often each ATT&CK technique is leveraged in a confirmed threat in our customers' environments.

Heaven's Gate for Linux

Heaven’s Gate was originally published as an attacker technique for Windows. This technique allowed malicious software to evade endpoint security products by invoking 64-bit code in 32-bit processes, effectively bypassing user-mode hooks. This technique has since been mitigated in Windows 10+ through Control Flow Guard (CFG).

Red Canary has been successful in reproducing a variation of this technique for Linux.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].