Forescout / project-memoria-detectorLinks
☆321Updated 4 years ago
Alternatives and similar repositories for project-memoria-detector
Users that are interested in project-memoria-detector are comparing it to the libraries listed below
Sorting:
- SunBurst DGA Decode Script☆207Updated 4 years ago
- A DFIR tool written in Python.☆1,053Updated 4 years ago
- Ongoing Infosec Deals☆111Updated 10 months ago
- ☆561Updated 2 years ago
- List of the tools and usage☆234Updated 3 months ago
- ☆355Updated 3 years ago
- ☆100Updated 4 years ago
- 100Gbps Intrusion Detection and Prevention System☆688Updated last year
- Understand adversary tradecraft and improve detection strategies☆714Updated 2 years ago
- ☆246Updated 4 years ago
- A network packet forensics tool for SSH☆253Updated 4 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361Updated last year
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Updated 2 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆373Updated 4 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 4 years ago
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆208Updated 4 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- ☆1,277Updated 5 months ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆311Updated 8 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,196Updated 5 months ago
- ☆196Updated 4 years ago
- A Passive SSH back-end and scanner.☆104Updated 4 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 3 years ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆120Updated last year
- Detector for Log4Shell exploitation attempts☆729Updated 3 years ago
- Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.☆82Updated 3 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆911Updated last year
- The Binary Analysis Metadata tool gathers information about Windows binaries to aid in their analysis. #nsacyber☆162Updated last year