Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/usernotfoundever/cloudflare-fraud-detect
Detects potential use of cloudflare attacking your computer to steal information. He's a simple way of detecting and removing it. Feel free to add on to it.
https://github.com/usernotfoundever/cloudflare-fraud-detect
Last synced: about 24 hours ago
JSON representation
Detects potential use of cloudflare attacking your computer to steal information. He's a simple way of detecting and removing it. Feel free to add on to it.
- Host: GitHub
- URL: https://github.com/usernotfoundever/cloudflare-fraud-detect
- Owner: UserNotFoundEver
- License: unlicense
- Created: 2024-08-05T02:15:36.000Z (3 months ago)
- Default Branch: main
- Last Pushed: 2024-08-05T02:28:10.000Z (3 months ago)
- Last Synced: 2024-08-05T03:51:54.281Z (3 months ago)
- Language: Python
- Size: 9.77 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Enhancements Explained:
Signature-Based Detection: Uses a list of known malware file hashes to detect known malware.
# Heuristic Analysis:Now add a placeholder for heuristic checks, which can be expanded to detect suspicious patterns and detective like this amongst other ways.
```
shasum -a 256 path_to_malware_file```
# Behavioral Analysis: Monitors a specified directory for unusual file modifications and triggers file analysis when changes are detected.
Logging Enhancements: Provides detailed logs for all actions, including file downloads, analysis results, and file modifications.# Usage:
Sniff Packets: Starts sniffing network packets on the specified interface (en0 for macOS).
Process Detection: Identifies potential misuse of Cloudflare tunnels.
Download & Analyze: Downloads suspicious files and performs signature-based and heuristic analysis.
Behavioral Monitoring: Monitors specified directories for unusual file modifications and analyzes newly added files.
Removal: Removes detected malware files and terminates malicious processes.
Signature-Based Detection: Uses known signatures to identify malicious files.
Behavioral Analysis: Monitors unusual file modifications or network traffic.
Heuristic Analysis: Detects potentially malicious behavior based on patterns.
Logging Enhancements: Provides detailed logs for better monitoring and debugging.