Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake
☆18Nov 25, 2022Updated 3 years ago
Alternatives and similar repositories for log4shell_iocs
Users that are interested in log4shell_iocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Hayden Housen's solutions to the 2021 HackTheBox "Cyber Santa is Coming to Town" Competition☆19May 29, 2022Updated 3 years ago
- HHousen's writeups to various HackTheBox machines and challenges from https://hackthebox.com.☆21Mar 3, 2023Updated 3 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Dec 9, 2022Updated 3 years ago
- AWS lambda function to ship ELB, S3, CloudTrail, VPC, CloudFront logs to Logmatic.io☆12Mar 5, 2018Updated 8 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 5 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- rename☆19Jul 19, 2017Updated 8 years ago
- Motor de búsqueda para filtrar por todas las máquinas de HackTheBox que s4vitar ha hecho.☆12Dec 8, 2022Updated 3 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 5 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- moved to: https://github.com/alphaSeclab/awesome-reverse-engineering☆21Nov 25, 2019Updated 6 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆20Jan 9, 2026Updated 3 months ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Dec 18, 2024Updated last year
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆29Mar 8, 2021Updated 5 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year