{"id":13540346,"url":"https://github.com/intezer/linux-explorer","last_synced_at":"2025-04-02T07:30:52.684Z","repository":{"id":42382952,"uuid":"112082201","full_name":"intezer/linux-explorer","owner":"intezer","description":"Easy-to-use live forensics toolbox for Linux endpoints","archived":true,"fork":false,"pushed_at":"2024-03-03T19:36:15.000Z","size":1776,"stargazers_count":405,"open_issues_count":2,"forks_count":59,"subscribers_count":45,"default_branch":"master","last_synced_at":"2024-03-04T20:01:05.357Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"HTML","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/intezer.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2017-11-26T12:51:38.000Z","updated_at":"2024-08-01T09:24:05.086Z","dependencies_parsed_at":"2024-01-13T10:12:37.240Z","dependency_job_id":"b1ebe85a-6da1-4588-a141-0751f3f4fa05","html_url":"https://github.com/intezer/linux-explorer","commit_stats":null,"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/intezer%2Flinux-explorer","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/intezer%2Flinux-explorer/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/intezer%2Flinux-explorer/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/intezer%2Flinux-explorer/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/intezer","download_url":"https://codeload.github.com/intezer/linux-explorer/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246774272,"owners_count":20831503,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-01T09:01:47.325Z","updated_at":"2025-04-02T07:30:47.669Z","avatar_url":"https://github.com/intezer.png","language":"HTML","readme":"# This project is no longer maintained!\n\n# Linux Expl0rer\nEasy-to-use live forensics toolbox for Linux endpoints written in Python \u0026 Flask.\n\n![Alt Text](https://github.com/intezer/linux-explorer/raw/master/image.gif)\n\n## Capabilities\n### ps\n* View full process list\n* Inspect process memory map \u0026 fetch memory strings easly\n* Dump process memory in one click\n* Automatically search hash in public services\n  * [VirusTotal](https://www.virustotal.com/#/home/upload)\n  * [Intezer Analyze](https://analyze.intezer.com)\n  * [AlienVault OTX](https://otx.alienvault.com/)\n  * [MalShare](https://malshare.com/)\n### users\n* users list\n### find\n* Search for suspicious files by name/regex\n### netstat\n* Whois\n### logs\n* syslog\n* auth.log(user authentication log)\n* ufw.log(firewall log)\n* bash history\n### anti-rootkit\n* chkrootkit\n### yara\n* Scan a file or directory using YARA signatures by @Neo23x0\n* Scan a running process memory address space\n* Upload your own YARA signature\n  \n## Requirements\n* Python 3.6\n\n## Installation\n```sh\nwget https://github.com/intezer/linux-explorer/archive/master.zip -O master.zip\nunzip master.zip\ncd linux-explorer-master\n./deploy.sh\n```\n\n## Usage\n1. Start your browser\n```sh\nfirefox http://127.0.0.1:8080\n```\n\n## Configure API keys (optional)\n```sh\nnano config.py\n```\nEdit following lines:\n```py\nINTEZER_APIKEY = '\u003ckey\u003e'\nVT_APIKEY = '\u003ckey\u003e'\nOTX_APIKEY = '\u003ckey\u003e'\nMALSHARE_APIKEY = '\u003ckey\u003e'\n```\n\n## Notes\n* We recommend using NGINX [reverse proxy with basic http auth](https://www.nginx.com/resources/admin-guide/restricting-access-auth-basic/) \u0026 ssl for secure remote access\n* Tested with Ubuntu 16.04\n\n## Misc\n* [\"How to get a VirusTotal public API Key\"](https://community.mcafee.com/docs/DOC-6456)\n* [\"To get an API Key for Intezer Analyze\"](https://analyze.intezer.com/#/create-account)\n","funding_links":[],"categories":["Tools","\u003ca id=\"e1fc1d87056438f82268742dc2ba08f5\"\u003e\u003c/a\u003e事件响应\u0026\u0026取证\u0026\u0026内存取证\u0026\u0026数字取证","Challenges","HTML","HTML (177)","\u003ca id=\"505d67a56d03c921dd19737c28c3d8fc\"\u003e\u003c/a\u003eLinux"],"sub_categories":["Live Forensics","\u003ca id=\"1fc5d3621bb13d878f337c8031396484\"\u003e\u003c/a\u003e取证\u0026\u0026Forensics\u0026\u0026数字取证\u0026\u0026内存取证","Live forensics"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fintezer%2Flinux-explorer","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fintezer%2Flinux-explorer","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fintezer%2Flinux-explorer/lists"}