Qualys / log4jscanlinux
☆36Updated 3 years ago
Alternatives and similar repositories for log4jscanlinux
Users that are interested in log4jscanlinux are comparing it to the libraries listed below
Sorting:
- Merge & query nmap and nessus reports via SQL directly in your browser!☆21Updated 3 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- A Log4j writeup and Docker based PoC written in PowerShell☆76Updated last year
- ☆36Updated 3 years ago
- Tools and scripts by Arctic Wolf☆67Updated last year
- Official Palo Alto Networks MineMeld docker☆17Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- CrowdStrike Archive Scan Tool☆83Updated 3 years ago
- Code & other materials from SEC-T 2022 talk "When SysAdmin & Hacker Unite: 21 One-Liners to make you convert from bash to Powershell"☆17Updated 2 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- ☆15Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆66Updated 2 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- The All In One Script!☆10Updated 5 years ago
- ☆69Updated last year
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Disabling PowerShell v2 with Group Policy☆15Updated 3 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆51Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆35Updated 3 years ago
- ☆19Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Some resources to facilitate my blog on auditd for security monitoring☆12Updated 2 years ago