FCL
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions (by chenerlich)
Crawlector
Crawlector is a threat hunting framework designed for scanning websites for malicious objects. (by MFMokbel)
FCL | Crawlector | |
---|---|---|
2 | 2 | |
459 | 124 | |
- | - | |
0.0 | 6.4 | |
about 3 years ago | 6 months ago | |
- | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
FCL
Posts with mentions or reviews of FCL.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-08-17.
-
My "hacking" bookmarks / tools
Pretty cool stuff https://github.com/chenerlich/FCL/blob/master/Malwares/Locky.md
-
Excecuting an .vbs oneliner without dropping files on disk?
Fileless malware samples
Crawlector
Posts with mentions or reviews of Crawlector.
We have used some of these posts to build our list of alternatives
and similar projects.
What are some alternatives?
When comparing FCL and Crawlector you can also consider the following projects:
cyberchef-recipes - A list of cyber-chef recipes and curated links
awesome-detection-engineering - Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
awesome-yara - A curated list of awesome YARA rules, tools, and people.
NodeJS-Red-Team-Cheat-Sheet - NodeJS Red-Team Cheat Sheet