Mirai Tracker is a cybersecurity tool that detects and logs SYN packets with a specific signature generated by the Mirai malware. The tracker analyzes SYN packets with a TTL value of 64, a random TCP window size, and a TCP sequence number corresponding to the integer value of the IP destination. The tool is based in Europe and provides real-time information on Mirai-based campaigns. It also offers a solution using SCAPY to detect these packets. The tracker includes additional features such as IP list, SQLite DB, and maps to help correlate Mirai variant recognition. It is an essential resource for cybersecurity professionals and researchers tracking Mirai-related activities. The tool is regularly updated to track the evolution of Mirai-based campaigns, providing valuable insights into the malware's behavior and helping to improve detection and mitigation strategies.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.
A threat intelligence service providing actionable IoCs and security data feeds to help organizations detect, block, and respond to cyber threats.
Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.
A collection of public YARA signatures for various malware families.
NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.
Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.
Repository with projects for photo and video hashing, content moderation, and signal exchange.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.