Detection rules to look for Log4J usage and exploitation
☆18Jun 21, 2025Updated 8 months ago
Alternatives and similar repositories for log4j
Users that are interested in log4j are comparing it to the libraries listed below
Sorting:
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- ☆15Feb 25, 2023Updated 3 years ago
- pf log daemon for macOS☆14May 16, 2017Updated 8 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- ☆17Oct 27, 2017Updated 8 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- A script+application that provides the selection of a Munki manifest template as part of a Deploy Studio workflow.☆25May 28, 2014Updated 11 years ago
- QRadar Export the rule set for printing☆23Oct 23, 2017Updated 8 years ago
- OS X image build automation☆40Apr 9, 2022Updated 3 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆35Jan 18, 2026Updated last month
- ☆34Aug 8, 2023Updated 2 years ago
- MOMenu is a statusbar item with a plug-in architecture.☆46Oct 12, 2016Updated 9 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Solve problems of device identity, certificates and the keychain.☆13Jan 3, 2019Updated 7 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- 🪓 High-Speed Log Analysis & Forensics Tool - Part of NullSec Toolkit☆65Updated this week
- The future of DevOps☆10Jan 27, 2022Updated 4 years ago
- Take any Computer/Mobile Advanced Search in the JSS and publish it to Google Sheets☆13Oct 9, 2015Updated 10 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated 2 weeks ago
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year
- A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the do…☆11Nov 24, 2025Updated 3 months ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Ensure you know if systems don't work like they should - with Operational Verification and Validation resources☆11Jan 31, 2022Updated 4 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- JSON Tools Technology Add-On for Splunk☆10Mar 31, 2021Updated 4 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Public AutoPkg CI with Jenkins.☆14Jun 19, 2016Updated 9 years ago
- Blocks unsigned internet binaries from executing (El Capitan)☆10Feb 1, 2021Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago