Mirai Tracker Logo

Mirai Tracker

0
Free
Visit Website

Mirai Tracker is a cybersecurity tool that detects and logs SYN packets with a specific signature generated by the Mirai malware. The tracker analyzes SYN packets with a TTL value of 64, a random TCP window size, and a TCP sequence number corresponding to the integer value of the IP destination. The tool is based in Europe and provides real-time information on Mirai-based campaigns. It also offers a solution using SCAPY to detect these packets. The tracker includes additional features such as IP list, SQLite DB, and maps to help correlate Mirai variant recognition. It is an essential resource for cybersecurity professionals and researchers tracking Mirai-related activities. The tool is regularly updated to track the evolution of Mirai-based campaigns, providing valuable insights into the malware's behavior and helping to improve detection and mitigation strategies.

FEATURES

ALTERNATIVES

Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.

A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.

A threat intelligence and vulnerability monitoring platform that aggregates security alerts from trusted sources and provides customizable monitoring and notification capabilities.

Tool for dataviz and statistical analysis of threat intelligence feeds, presented in cybersecurity conferences for measuring IQ of threat intelligence feeds.

Knowledge base workflow management dashboard for YARA rules and C2 artifacts.

Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.

The Cybersecurity and Infrastructure Security Agency (CISA) is a government agency that provides alerts, advisories, and resources to help protect the United States' critical infrastructure from cyber threats.

Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.

PINNED