Qualys / log4jscanlinuxLinks
☆37Updated last month
Alternatives and similar repositories for log4jscanlinux
Users that are interested in log4jscanlinux are comparing it to the libraries listed below
Sorting:
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 4 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- ☆15Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- CrowdStrike Archive Scan Tool☆85Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 8 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 4 years ago
- nse script to inject jndi payloads☆45Updated 4 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 4 years ago
- Collection of useful Canary tools☆91Updated this week
- Tools and scripts by Arctic Wolf☆70Updated 6 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Nessus Audit files☆32Updated 2 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆99Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- Linux Incident Response☆90Updated 6 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Updated 2 years ago
- Phishing campaign docker composition for Gophish☆45Updated last week
- Detections for CVE-2021-44228 inside of nested binaries☆35Updated 4 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- ☆41Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago