Malicious Command-Line
MAL-CL (Malicious Command-Line) aims to collect and document real world and most common "malicious" command-line executions of different tools and utilities while providing actionable detections and resources for the blue team.
Coverage Mind Map
The following MindMap display the tools and utilities currently covered by MAL-CL.
Contributing
If you find a process or a tool that has some command-line options that can or have been (ab)used, please consider contributing them.
- Create a folder inside one of the available platforms (
Other
,Antivirus
,Windows
). - Inside that folder create a
README.md
file.
You can use the template available here or simply copy one the already existsting README files and use it as a base. Please follow the same structure and don't remove any titles (all are required).
Looking forward to your awesome contributions.
Feedback
Found this interesting? Have a question/comment/request? Let us know!
Feel free to open an issue or ping us on Twitter. We also have a Community Slack where you can discuss our open-source projects, participate in giveaways and have access to projects before they are released to the public.