⚡ Malicious Commands Feed
Real commands and payloads executed by attackers on our honeypots. Valuable for understanding attack patterns, building detection rules, and security research.
⚠️ Warning: These commands are malicious. Do not execute them on production systems. Use only for research and detection rule development.
How to Use Command Feeds
Create SIEM Detection Rules:
# Splunk Detection
index=linux sourcetype=bash_history
[| inputlookup checkthesum_commands.csv | fields command]
# Elastic SIEM
GET /logs/_search
{
"query": {
"terms": {
"process.command_line": {
"index": "checkthesum-commands"
}
}
}
}
Analyze Attack Patterns:
#!/usr/bin/env python3
import requests
from collections import Counter
# Download commands
response = requests.get('https://www.check-the-sum.fr/feeds/commands/commands.txt')
commands = response.text.strip().split('\n')
# Analyze patterns
first_words = [cmd.split()[0] if cmd.split() else '' for cmd in commands]
common_commands = Counter(first_words).most_common(10)
print("Top 10 most common attack commands:")
for cmd, count in common_commands:
print(f"{cmd}: {count} times")
Generate Suricata Rules:
# Example Suricata rule for malicious commands alert tcp any any -> any 22 ( msg:"Malicious SSH command detected"; content:"wget http"; nocase; flow:to_server,established; classtype:trojan-activity; sid:1000001; rev:1; )