Rule Library

Sigma Rules

1,478 rules found for "execution"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Capsh Shell Invocation - Linux

Detects the use of the "capsh" utility to invoke a shell.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionlowexperimental

Linux Sudo Chroot Execution

Detects the execution of 'sudo' command with '--chroot' option, which is used to change the root directory for command execution. Attackers may use this technique to evade detection and execute commands in a modified environment. This can be part of a privilege escalation strategy, as it allows the execution of commands with elevated privileges in a controlled environment as seen in CVE-2025-32463. While investigating, look out for unusual or unexpected use of 'sudo --chroot' in conjunction with other commands or scripts such as execution from temporary directories or unusual user accounts.

LinuxProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Swachchhanda Shrawn Poudel (Nextron Systems)Thu Oct 02linux
Detectionhighexperimental

Suspicious Download and Execute Pattern via Curl/Wget

Detects suspicious use of command-line tools such as curl or wget to download remote content - particularly scripts - into temporary directories (e.g., /dev/shm, /tmp), followed by immediate execution, indicating potential malicious activity. This pattern is commonly used by malicious scripts, stagers, or downloaders in fileless or multi-stage Linux attacks.

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix ShellT1203 · Exploitation for Client Execution
Aayush GuptaTue Jun 17linux
Detectionlowstable

Linux Doas Tool Execution

Detects the doas tool execution in linux host platform. This utility tool allow standard users to perform tasks as root, the same way sudo does.

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Sittikorn S+1Thu Jan 20linux
Detectionhightest

Shell Invocation via Env Command - Linux

Detects the use of the env command to invoke a shell. This may indicate an attempt to bypass restricted environments, escalate privileges, or execute arbitrary commands.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionmediumtest

ESXi Network Configuration Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "network" flag in order to retrieve information about the network configuration.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionhightest

ESXi Admin Permission Assigned To Account Via ESXCLI

Detects execution of the "esxcli" command with the "system" and "permission" flags in order to assign admin permissions to an account.

LinuxProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege Escalationattack.t1059.012+1
Nasreddine Bencherchali (Nextron Systems)Mon Sep 04linux
Detectionmediumtest

ESXi Storage Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "storage" flag in order to retrieve information about the storage status and other related information. Seen used by malware such as DarkSide and LockBit.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi Syslog Configuration Change Via ESXCLI

Detects changes to the ESXi syslog configuration via "esxcli"

LinuxProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1562.001 · Disable or Modify ToolsT1562.003 · Impair Command History Logging+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi System Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "system" flag in order to retrieve information about the different component of the system. Such as accounts, modules, NTP, etc.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi Account Creation Via ESXCLI

Detects user account creation on ESXi system via esxcli

LinuxProcess Creation
TA0003 · PersistenceTA0002 · ExecutionT1136 · Create Accountattack.t1059.012
Cedric MaurugeonTue Aug 22linux
Detectionmediumtest

ESXi VM List Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "vm" flag in order to retrieve information about the installed VMs.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi VM Kill Via ESXCLI

Detects execution of the "esxcli" command with the "vm" and "kill" flag in order to kill/shutdown a specific VM.

LinuxProcess Creation
TA0002 · ExecutionTA0040 · Impactattack.t1059.012T1529 · System Shutdown/Reboot
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi VSAN Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionhightest

Shell Execution via Find - Linux

Detects the use of the find command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or exploitation attempt.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Flock - Linux

Detects the use of the "flock" command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution GCC - Linux

Detects the use of the "gcc" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Git - Linux

Detects the use of the "git" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionlowtest

OS Architecture Discovery Via Grep

Detects the use of grep to identify information about the operating system architecture. Often combined beforehand with the execution of "uname" or "cat /proc/cpuinfo"

LinuxProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Group Has Been Deleted Via Groupdel

Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks

LinuxProcess Creation
TA0040 · ImpactT1531 · Account Access Removal
Tuan Le (NCSGroup)Mon Dec 26linux
Detectionlowtest

Named Pipe Created Via Mkfifo

Detects the creation of a new named pipe using the "mkfifo" utility

LinuxProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jun 16linux
Detectionmediumtest

Potentially Suspicious Named Pipe Created Via Mkfifo

Detects the creation of a new named pipe using the "mkfifo" utility in a potentially suspicious location

LinuxProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jun 16linux
Detectionmediumtest

Mount Execution With Hidepid Parameter

Detects execution of the "mount" command with "hidepid" parameter to make invisible processes to other users from the system

LinuxProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionT1564 · Hide Artifacts
Joseliyo SanchezThu Jan 12linux
Detectionhightest

Potential Netcat Reverse Shell Execution

Detects execution of netcat with the "-e" flag followed by common shells. This could be a sign of a potential reverse shell setup.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
@d4ns4n_+1Fri Apr 07linux
Detectionhightest

Shell Execution via Nice - Linux

Detects the use of the "nice" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionmediumtest

Nohup Execution

Detects usage of nohup which could be leveraged by an attacker to keep a process running or break out from restricted environments

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix Shell
Christopher Peacock+1Mon Jun 06linux
Detectionhightest

Suspicious Nohup Execution

Detects execution of binaries located in potentially suspicious locations via "nohup"

LinuxProcess Creation
TA0002 · Execution
Joseliyo SanchezFri Jun 02linux
Detectionhightest

OMIGOD SCX RunAsProvider ExecuteScript

Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx* prefix. Then it is invoked from the following directory /etc/opt/microsoft/scx/conf/tmpdir/. The file in that directory has the same prefix scx*. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1068 · Exploitation for Privilege Escalation+2
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionhightest

OMIGOD SCX RunAsProvider ExecuteShellCommand

Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1068 · Exploitation for Privilege Escalation+2
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionhightest

Potential Perl Reverse Shell Execution

Detects execution of the perl binary with the "-e" flag and common strings related to potential reverse shell activity

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_+1Fri Apr 07linux
Detectionhightest

Potential PHP Reverse Shell

Detects usage of the PHP CLI with the "-r" flag which allows it to run inline PHP code. The rule looks for calls to the "fsockopen" function which allows the creation of sockets. Attackers often leverage this in combination with functions such as "exec" or "fopen" to initiate a reverse shell connection.

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_Fri Apr 07linux
Detectionmediumexperimental

PUA - TruffleHog Execution - Linux

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.

LinuxProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1083 · File and Directory DiscoveryT1552.001 · Credentials In Files
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 24linux
Detectionmediumexperimental

Python WebServer Execution - Linux

Detects the execution of Python web servers via command line interface (CLI). After gaining access to target systems, adversaries may use Python's built-in HTTP server modules to quickly establish a web server without requiring additional software. This technique is commonly used in post-exploitation scenarios as it provides a simple method for transferring files between the compromised host and attacker-controlled systems.

LinuxProcess Creation
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
Mohamed LAKRIFri Oct 17linux
Detectionmediumtest

Python Spawning Pretty TTY Via PTY Module

Detects a python process calling to the PTY module in order to spawn a pretty tty which could be indicative of potential reverse shell activity.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nextron SystemsFri Jun 03linux
Detectionhightest

Python Reverse Shell Execution Via PTY And Socket Modules

Detects the execution of python with calls to the socket and pty module in order to connect and spawn a potential reverse shell.

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_+1Mon Apr 24linux
Detectionhightest

Inline Python Execution - Spawn Shell Via OS System Library

Detects execution of inline Python code via the "-c" in order to call the "system" function from the "os" library, and spawn a shell.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhighexperimental

Shell Execution via Rsync - Linux

Detects the use of the "rsync" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+4Mon Sep 02linux
Detectionhighexperimental

Suspicious Invocation of Shell via Rsync

Detects the execution of a shell as sub process of "rsync" without the expected command line flag "-e" being used, which could be an indication of exploitation as described in CVE-2024-12084. This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterT1203 · Exploitation for Client Execution
Florian Roth (Nextron Systems)Sat Jan 18linux
Detectionmediumtest

Potential Ruby Reverse Shell

Detects execution of ruby with the "-e" flag and calls to "socket" related functions. This could be an indication of a potential attempt to setup a reverse shell

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_Fri Apr 07linux
Detectionmediumtest

Scheduled Cron Task/Job - Linux

Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.

LinuxProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.003 · Cron
Alejandro Ortuno+1Tue Oct 06linux
Detectionhightest

Shell Invocation Via Ssh - Linux

Detects the use of the "ssh" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Thu Aug 29linux
Detectionmediumtest

Potentially Suspicious Execution From Tmp Folder

Detects a potentially suspicious execution of a process located in the '/tmp/' folder

LinuxProcess Creation
TA0005 · Defense EvasionT1036 · Masquerading
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Potential Discovery Activity Using Find - Linux

Detects usage of "find" binary in a suspicious manner to perform discovery

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionmediumtest

Suspicious Git Clone - Linux

Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious

LinuxProcess Creation
TA0043 · Reconnaissanceattack.t1593.003
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03linux
Detectionhightest

Linux HackTool Execution

Detects known hacktool execution based on image name.

LinuxProcess Creation
TA0002 · ExecutionTA0042 · Resource DevelopmentT1587 · Develop Capabilities
Nasreddine Bencherchali (Nextron Systems)+1Tue Jan 03linux
Detectionmediumtest

Interactive Bash Suspicious Children

Detects suspicious interactive bash as a parent to rather uncommon child processes

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.004 · Unix ShellT1036 · Masquerading
Florian Roth (Nextron Systems)Mon Mar 14linux
Detectionhightest

Suspicious Java Children Processes

Detects java process spawning suspicious children

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri Jun 03linux
Detectionlowtest

Linux Network Service Scanning Tools Execution

Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.

LinuxProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+2Wed Oct 21linux