Fenrir Simple Bash IOC Scanner Logo

Fenrir Simple Bash IOC Scanner

0
Free
Visit Website

Fenrir is a simple IOC scanner bash script. It allows scanning Linux/Unix/OSX systems for the following Indicators of Compromise (IOCs): Hashes MD5, SHA1 and SHA256 (using md5sum, sha1sum, sha -a 256) File Names string - checked for substring of the full path, e.g. "temp/p.exe" in "/var/temp/p.exe" Strings grep in files C2 Server checking for C2 server strings in 'lsof -i' and 'lsof -i -n' output Hot Time Frame using stat in different modes - define min and max epoch time stamp and get all files that have been created in between Basic characteristics: Bash Script No installation or agent needed Uses common tools to extract attributes (e.g. md5sum, grep, stat in different modes) Intended to run on any Linux / Unix / OS X with Bash Low footprint - Ansible playbook with RAM drive solution Smart exclusions (file size, extension, certain directories) speeds up the scan process Why Fenrir? FENRIR is the 3rd tool after THOR and LOKI. THOR is our full featured APT Scanner with many modules and export types for corporate customers. LOKI is a free and open IOC scanner that uses YARA as signature format. The problem with both predecessors is that both have certain limitations.

FEATURES

ALTERNATIVES

An open-source security tool for testing data center resiliency to perimeter breaches and internal server infection.

A tool for extracting files from network traffic based on file signatures with support for various file formats and scalable search algorithm.

A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)

A low-interaction SSH honeypot written in C

Normalize, index, enrich, and visualize network capture data using Potiron.

A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic

A framework for creating and executing pynids-based decoders and detectors of APT tradecraft

An intrusion prevention system for SSH that blocks IP addresses after a set number of consecutive failed login attempts.

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Free
Resources
Kriptos Logo

Kriptos

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

Commercial
Data Protection
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security