Sandfly 5.4 - Cisco and Juniper Network Device Support
.
Learn more
Under Attack?
Support
Contact Us
Platform
Why Sandfly
Resources
About
Blog
Get Sandfly
Linux Security
Podcast
Eliminating Linux Security Blind Spots: Insights from the CISO Series Podcast
May 13, 2025
Malware
Detecting Bincrypter Linux Malware Obfuscation
March 27, 2025
Linux Security
Sandfly Wins Gold in the Cybersecurity Excellence Awards for EDR
March 20, 2025
Linux Security
Linux Password Hash Risks and Security Overview
March 3, 2025
Linux Security
SSH Lateral Movement Risks on Linux Webinar and White Paper
February 27, 2025
Linux Security
Detecting Melofee Stealth Backdoor Targeting Red Hat Linux
November 14, 2024
Videos
Rob Joyce Interview - Linux Critical Infrastructure Threats
October 15, 2024
Linux Security
De-Cloaking Linux Stealth Malware and Rootkits: sedexp, Diamorphine, and Reptile
October 13, 2024
Linux Security
Free Sandfly Linux Incident Response License
September 11, 2024
Linux Forensics
Evasive Linux Malware Detection Video Presentation (BPFDoor)
November 14, 2023
Malware
Defending Security Infrastructure Against Wild Weasels
September 3, 2023
Malware
Active vs. Dormant Attacks on Linux: Don't Neglect Either!
August 18, 2023
Malware
SSH Key Compromise Risks and Countermeasures
June 26, 2023
Linux Security
SSH Major Compromise Vector for Linux
January 5, 2023
Malware
Sandfly Linux File Entropy Scanner Updated
June 30, 2022
Linux Security
Leveling Up Your Linux Security
February 22, 2022
Malware
Log4j Kinsing Linux Stealth Malware in the Wild
December 14, 2021
Malware
Linux Stealth Rootkit Malware with EDR Evasion
November 29, 2021
Malware
Detecting CronRAT Crontab Malware on Linux
November 28, 2021
Linux Forensics
Linux Command Line Forensics and Intrusion Detection Cheat Sheet
May 20, 2021
Malware
Detecting and Investigating OpenSSL Backdoors on Linux
April 18, 2021
Rootkits
Linux Malware Investigation Myth: You Don’t Need a Debugger
January 18, 2021
Malware
Investigating Linux Process File Descriptors for Incident Response and Forensics
January 6, 2021
Linux Security
Getting In The Fight
September 3, 2020
Malware
Linux Stealth Rootkit Process Decloaking Tool – sandfly-processdecloak
August 16, 2020
Malware
Detecting Linux memfd_create() Fileless Malware with Command Line Forensics
July 8, 2020
Linux Security
Using Elasticsearch and Kibana to Investigate Suspicious Linux Activity with Sandfly
May 27, 2020
Malware
Detecting Linux Kernel Process Masquerading with Command Line Forensics
March 30, 2020
Malware
How To Decloak Stealth Linux Cryptocurrency Mining Malware
December 16, 2019
Malware
Sandfly Filescan Open Source File Entropy Scanner for Linux
November 25, 2019
Malware
Basic Linux Malware Process Forensics for Incident Responders
September 30, 2019
Malware
Using Linux utmpdump for Forensics and Detecting Log File Tampering
July 31, 2019
Malware
Getting an Attacker IP Address from a Malicious Linux At Job
July 25, 2019
Malware
Detecting and De-Cloaking HiddenWasp Linux Stealth Malware
June 3, 2019
Malware
How To Recover A Deleted Binary From Active Linux Malware
June 2, 2019
Malware
Using Linux Process Environment Variables for Live Forensics
May 5, 2019
Videos
The Advantages of Agentless Security and Intrusion Detection for Linux
March 6, 2019
Malware
Using Command Line Tools to Find Process Masquerading Linux Malware
February 27, 2019
Rootkits
Why You Must Monitor Linux for Signs of Intruders
February 20, 2019
Malware
Hunting for Linux Intrusion Tactics is Better than Searching for Exploit Signatures
February 13, 2019
Linux Security
Ninjas on Rooftops – A Better Approach to Linux Threat Hunting
February 11, 2019
Videos
Why You Should Be Searching for Linux Anti-Forensics
February 9, 2019
Presentations
Christchurch HackerCon 2018 Presentation – Insider’s History of Intrusion Detection Technology
November 1, 2018
Linux Security
Why Agentless Security is Needed on Linux
August 20, 2018
Malware
Linux Malware Cryptominer Detection and Forensics
July 25, 2018
Linux Security
The Pyramid of Pain and Sandfly
June 20, 2018
Malware
Detecting Linux Binary File Poisoning
June 13, 2018
Linux Security
Christchurch Hacker Con 2017 Linux Forensics Slides
May 29, 2018
Malware
Linux Malware Persistence with Cron
May 1, 2018
Malware
Linux Command Line Forensics Presentation at Christchurch Hacker Con 2017
April 26, 2018
Presentations
Christchurch Hacker Con Linux Digital Forensics Video
April 18, 2018