Forescout / project-memoria-detectorLinks
☆323Updated 4 years ago
Alternatives and similar repositories for project-memoria-detector
Users that are interested in project-memoria-detector are comparing it to the libraries listed below
Sorting:
- SunBurst DGA Decode Script☆205Updated 4 years ago
- Ongoing Infosec Deals☆113Updated last week
- A DFIR tool written in Python.☆1,052Updated 4 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 4 years ago
- List of the tools and usage☆234Updated 5 months ago
- ☆355Updated 3 years ago
- ☆563Updated 2 years ago
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆208Updated 5 years ago
- ☆246Updated 4 years ago
- A Passive SSH back-end and scanner.☆104Updated 5 months ago
- ☆100Updated 4 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆203Updated 3 years ago
- This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.☆943Updated last week
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,197Updated 7 months ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆361Updated last year
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆153Updated 5 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆920Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Updated 3 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 4 years ago
- Scanners for Jar files that may be vulnerable to CVE-2021-44228☆349Updated 3 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆272Updated 4 years ago
- URGENT/11 detection tool by Armis☆63Updated 6 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆189Updated last year
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Updated 4 years ago
- ☆292Updated 4 years ago
- Detector for Log4Shell exploitation attempts☆730Updated 3 years ago
- ☆373Updated 3 months ago