All Projects → richiercyrus → Venator

richiercyrus / Venator

Licence: gpl-3.0
[⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Venator

East icpr
Forked from argman/EAST for the ICPR MTWI 2018 CHALLENGE
Stars: ✭ 154 (-10.47%)
Mutual labels:  detection
Lc Finder
An image annotation and object detection tool written in C
Stars: ✭ 163 (-5.23%)
Mutual labels:  detection
Map
mean Average Precision - This code evaluates the performance of your neural net for object recognition.
Stars: ✭ 2,324 (+1251.16%)
Mutual labels:  detection
Blurdetection2
Blur Detection with OpenCV in Python
Stars: ✭ 156 (-9.3%)
Mutual labels:  detection
Opencv Lane Vehicle Track
OpenCV implementation of lane and vehicle tracking
Stars: ✭ 162 (-5.81%)
Mutual labels:  detection
Detect steel bar
CCFDF AI 数钢筋大赛
Stars: ✭ 164 (-4.65%)
Mutual labels:  detection
Detectem
detectem - detect software and its version on websites.
Stars: ✭ 152 (-11.63%)
Mutual labels:  detection
Ochumanapi
API for the dataset proposed in "Pose2Seg: Detection Free Human Instance Segmentation" @ CVPR2019.
Stars: ✭ 168 (-2.33%)
Mutual labels:  detection
Mstar deeplearning project
Radar target classification, detection and recognition using deeplearning methods on MSTAR dataset
Stars: ✭ 163 (-5.23%)
Mutual labels:  detection
Fetchcord
FetchCord grabs your OS info and displays it as Discord Rich Presence
Stars: ✭ 162 (-5.81%)
Mutual labels:  detection
Redditkit.rb
[Deprecated] A Ruby wrapper for the reddit API
Stars: ✭ 156 (-9.3%)
Mutual labels:  deprecated
Sphero Android Sdk
🚫 DEPRECATED REPO: Sphero™ is the amazing robotic ball ( gosphero.com ), this is the repository for the Android SDK for Sphero™. Visit dev site for more information:
Stars: ✭ 160 (-6.98%)
Mutual labels:  deprecated
Keras Metrics
Metrics for Keras. DEPRECATED since Keras 2.3.0
Stars: ✭ 164 (-4.65%)
Mutual labels:  deprecated
Fall Detection
Human Fall Detection from CCTV camera feed
Stars: ✭ 154 (-10.47%)
Mutual labels:  detection
A Pytorch Tutorial To Object Detection
SSD: Single Shot MultiBox Detector | a PyTorch Tutorial to Object Detection
Stars: ✭ 2,398 (+1294.19%)
Mutual labels:  detection
Derpn
A novel region proposal network for more general object detection ( including scene text detection ).
Stars: ✭ 155 (-9.88%)
Mutual labels:  detection
Elasto
DEPRECATED: Simple library to query Elasticsearch
Stars: ✭ 163 (-5.23%)
Mutual labels:  deprecated
Ofxlibwebsockets
[Deprecated] openFrameworks wrapper of libwebsockets for WebSocket client and server functionality
Stars: ✭ 171 (-0.58%)
Mutual labels:  deprecated
Cudlr
⛔️ [DEPRECATED] Console for Unity Debugging and Logging Remotely
Stars: ✭ 167 (-2.91%)
Mutual labels:  deprecated
Caffe Yolo9000
Caffe for YOLOv2 & YOLO9000
Stars: ✭ 164 (-4.65%)
Mutual labels:  detection

Venator is no longer supported/maintained, please consider using Venator-Swift instead.

Venator is a python tool used for gathering data for the purpose of proactive macOS detection. Support for High Sierra & Mojave using native macOS python version (2.7.x). Happy Hunting!

Accompanying blog post: https://posts.specterops.io/introducing-venator-a-macos-tool-for-proactive-detection-34055a017e56

*You may need to specify /usr/bin/python at command line instead of "python." if you have alternative versions of python installed.

S3 upload functionality is live: python Venator.py -a <BUCKET_NAME>:<AWS_KEY_ID>:<AWS_KEY_SECRET>:<AWS_REGION>

The script needs root permissions to run, or else you will get the error message below.

Below are the Venator modules and the data each module contains. Once the script is complete, you will be provide a JSON file for futher analysis/ingestion into a SIEM solution. You can search for data by module in the following way within the JSON file: module:<name of module>

system_info:

  • hostname
  • kernel
  • kernel_release

launch_agents:

  • label
  • program
  • program_arguments
  • signing_info
  • hash
  • executable
  • plist_hash
  • path
  • runAtLoad
  • hostname

launch_daemons:

  • label
  • program
  • program_arguments
  • signing_info
  • hash
  • executable
  • plist_hash
  • path
  • runAtLoad
  • hostname

users:

  • users
  • hostname

safari_extensions:

  • extension name
  • apple_signed
  • developer_identifier
  • extension_path
  • hostname

chrome_extensions:

  • extension_directory_name
  • extension_update_url
  • extension_name
  • hostname

chrome_downloads:

  • hash
  • opened
  • start_time
  • current_path
  • target_path
  • state
  • tab_url
  • tab_referrer_url
  • site_url
  • referrer
  • mime_type
  • original_mime_type
  • total_bytes
  • danger_type
  • by_ext_id
  • by_ext_name

firefox_extensions:

  • extension_id
  • extension_update_url
  • extension_options_url
  • extension_install_date
  • extension_last_updated
  • extension_source_uri
  • extension_name
  • extension_description
  • extension_creator
  • extension_homepage_url
  • hostname

install_history:

  • install_date
  • display_name
  • package_identifier
  • hostname

cron_jobs:

  • user
  • crontab
  • hostname

emond_rules:

  • rule
  • path
  • hostname

environment_variables:

  • hostname
  • variable:value

periodic_scripts:

  • hostname
  • periodic_script:"content of script"

current_connections:

  • process_name
  • process_id
  • user
  • TCP_UDP
  • connection_flow
  • hostname

sip_status:

  • sip_status
  • hostname

gatekeeper_status:

  • gatekeeper_status
  • hostname

login_items:

  • hostname
  • application
  • executable
  • application_hash
  • signature

applications:

  • hostname
  • application
  • executable
  • application_hash
  • signature

event_taps:

  • eventTapID
  • tapping_process_id
  • tapping_process_name
  • tapped_process_id
  • enabled
  • hostname

bash_history:

  • user
  • bash_commands
  • hostname

shell_startup:

  • user
  • hostname
  • shell_startup_filename
  • shell_startup_data

If the script is run with the '-v' flag, then the hash will be sent to VirusTotal for comparison with their database. This uses their Public API but still requires the use of an API key. You can obtain one from their site, and include it in the Venator command line (or script if appropriate):

sudo VTKEY=<YOUR API KEY HERE> /usr/bin/python2.7 Venator.py -v

The calls to VirusTotal do add some running time due to public API key throttling.

When ran with this option a new stanza will appear where appropriate: virustotal_result, with possible values This file is OK., This file has no VirusTotal entry. or POSITIVE VT SCAN - See link_to_virustotal_entry.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].