Forescout / project-memoria-detectorLinks
☆319Updated 3 years ago
Alternatives and similar repositories for project-memoria-detector
Users that are interested in project-memoria-detector are comparing it to the libraries listed below
Sorting:
- ☆354Updated 3 years ago
- SunBurst DGA Decode Script☆207Updated 4 years ago
- A DFIR tool written in Python.☆1,048Updated 4 years ago
- Understand adversary tradecraft and improve detection strategies☆710Updated 2 years ago
- ☆1,271Updated last month
- ☆561Updated 2 years ago
- ☆100Updated 4 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆182Updated 3 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 3 years ago
- A tool for IDN homograph attacks and detection.☆737Updated 4 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- 100Gbps Intrusion Detection and Prevention System☆681Updated 10 months ago
- Ongoing Infosec Deals☆111Updated 7 months ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Updated last year
- ☆246Updated 4 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆672Updated last year
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆904Updated last year
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆208Updated 4 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- Detector for Log4Shell exploitation attempts☆732Updated 3 years ago
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆952Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,182Updated last month
- AI-based, context-driven network device ranking☆296Updated last year
- A Simple Ransomware Vaccine☆965Updated last year
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆824Updated 4 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 2 years ago
- ☆196Updated 4 years ago
- A fast and secure multi protocol honeypot.☆322Updated 2 years ago