Forescout / project-memoria-detectorLinks
☆320Updated 4 years ago
Alternatives and similar repositories for project-memoria-detector
Users that are interested in project-memoria-detector are comparing it to the libraries listed below
Sorting:
- Ongoing Infosec Deals☆111Updated 9 months ago
- A DFIR tool written in Python.☆1,050Updated 4 years ago
- SunBurst DGA Decode Script☆207Updated 4 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆912Updated last year
- List of the tools and usage☆234Updated last month
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆803Updated 3 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆402Updated 4 years ago
- ☆355Updated 3 years ago
- ☆561Updated 2 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 3 years ago
- ☆246Updated 4 years ago
- ☆101Updated 4 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆359Updated last year
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆300Updated 7 months ago
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆208Updated 4 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 4 years ago
- A Passive SSH back-end and scanner.☆103Updated 2 months ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆121Updated last year
- Understand adversary tradecraft and improve detection strategies☆714Updated 2 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆537Updated 4 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- The TLS-Scanner Module from TLS-Attacker☆278Updated 3 weeks ago
- ☆252Updated 4 years ago
- A fast and secure multi protocol honeypot.☆323Updated 2 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- 100Gbps Intrusion Detection and Prevention System☆683Updated last year