linux-malware-detect
lynis
linux-malware-detect | lynis | |
---|---|---|
4 | 72 | |
1,121 | 12,584 | |
- | 1.6% | |
4.5 | 7.8 | |
6 months ago | 2 days ago | |
Shell | Shell | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
linux-malware-detect
-
Who does check linux distros of malware - open source
Linux has (free) tools to improve security and detect/remove malware: Lynis,Chkrootkit,Rkhunter,ClamAV,Vuls,LMD,radare2,Yara,ntopng,maltrail,Snort,Suricata...
-
WordPress store customers info getting compromised help
Unfortunately yes. On the plus side, this will help ensure they can't get in again. One more thing to add that list... You can use maldet to check for malware/compromised files. It's not the best malware scanner, but it's free and can help find malware in other hidden folders/files: https://www.rfxn.com/projects/linux-malware-detect/
-
What affordable anti-malware suites are available for Zorin Lite?
there is also linux-malware-detect - maldet -- https://www.rfxn.com/projects/linux-malware-detect/ [github repo] -- which can work in tangent with what you mentioned, ClamAV, but is not a requirement for operation..
-
Good way to backup systemctl services?
when the package being installed is intended to be ran as a systemd service, the PKGBUILD file, which we'll reference maldet's as an example, contains a line with a command, see line 107, that places the service file, in our case this file into the location specified, /usr/lib/systemd/system/maldet.service.
lynis
-
Who does check linux distros of malware - open source
Linux has (free) tools to improve security and detect/remove malware: Lynis,Chkrootkit,Rkhunter,ClamAV,Vuls,LMD,radare2,Yara,ntopng,maltrail,Snort,Suricata...
- Learn security best practices
- How do i find and remove the compilers installed in fedora?
-
Fight against scans, bots and script-kiddies
What I would do in your place is run this https://github.com/CISOfy/lynis and follow some of the instructions.
-
What are your favorite sites that are privacy related that you bookmarked?
https://github.com/CISOfy/Lynis (Linux hardening)
- Server security/hardening baselines for Linux Template
- Ultimate privacy when setting up Fedora?
- Linux security tests?
- Vulnerability scanning tools for homelab?
-
Cyber Security for developers: what and where to learn?
Linux security audit scanner
What are some alternatives?
clamav - ClamAV - Documentation is here: https://docs.clamav.net
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Suricata - Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
OSSEC - OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
svntogit-packages - Automatic import of svn 'packages' repo (read-only mirror)
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
cve-check-tool - Original Automated CVE Checking Tool
OSQuery - SQL powered operating system instrumentation, monitoring, and analytics.
debian-cis - PCI-DSS compliant Debian 10/11/12 hardening
pfSense - Main repository for pfSense
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
Snort - Snort++