Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
root
committed
Mar 25, 2016
1 parent
8a0d38b
commit a1b2ebf
Showing
2 changed files
with
27 additions
and
22 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,18 +1,19 @@ | ||
# Limon - Sandbox for Analyzing Linux Malwares | ||
|
||
Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time indicators of Linux malware. It allows one to inspect the Linux malware before execution, during execution, and after execution (post-mortem analysis) by performing static, dynamic and memory analysis using open source tools. Limon analyzes the malware in a controlled environment, monitors its activities and its child processes to determine the nature and purpose of the malware. It determines the malware's process activity, interaction with the file system, network, it also performs memory analysis and stores the analyzed artifacts for later analysis. | ||
|
||
Analyzing Linux Malwares Using Limon | ||
|
||
http://malware-unplugged.blogspot.com/2015/11/limon-sandbox-for-analyzing-linux.html | ||
|
||
Setting up and Configuring Limon | ||
|
||
http://malware-unplugged.blogspot.com/2015/11/setting-up-limon-sandbox-for-analyzing.html | ||
|
||
Black Hat 2015 Europe presentation (Automating Linux Malware Analysis Using Limon Sandbox) | ||
|
||
https://www.blackhat.com/eu-15/briefings.html#automating-linux-malware-analysis-using-limon-sandbox | ||
|
||
|
||
|
||
# Limon - Sandbox for Analyzing Linux Malwares | ||
|
||
Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time indicators of Linux malware. It allows one to inspect the Linux malware before execution, during execution, and after execution (post-mortem analysis) by performing static, dynamic and memory analysis using open source tools. Limon analyzes the malware in a controlled environment, monitors its activities and its child processes to determine the nature and purpose of the malware. It determines the malware's process activity, interaction with the file system, network, it also performs memory analysis and stores the analyzed artifacts for later analysis. | ||
|
||
Analyzing Linux Malwares Using Limon | ||
|
||
http://malware-unplugged.blogspot.com/2015/11/limon-sandbox-for-analyzing-linux.html | ||
|
||
Setting up and Configuring Limon | ||
|
||
http://malware-unplugged.blogspot.com/2015/11/setting-up-limon-sandbox-for-analyzing.html | ||
|
||
Black Hat 2015 Europe Video Recording (Automating Linux Malware Analysis Using Limon Sandbox) | ||
|
||
https://youtu.be/fSCKyF--tRs | ||
|
||
Black Hat 2015 Europe presentation (Automating Linux Malware Analysis Using Limon Sandbox) | ||
|
||
https://www.blackhat.com/eu-15/briefings.html#automating-linux-malware-analysis-using-limon-sandbox |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters