☆15Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for log4j_response
Users that are interested in log4j_response are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- Parse greppable Nmap output as a tree☆13Nov 13, 2022Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 7 months ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Cookiecutter template for new Ansible projects☆12Jul 14, 2017Updated 8 years ago
- Python scripts for working with ISE☆37Mar 24, 2025Updated last year
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Penetration testing “drop box”☆14Sep 12, 2018Updated 7 years ago
- ☆21Jun 23, 2018Updated 7 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Apr 21, 2026Updated last month
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- devops☆12Mar 30, 2015Updated 11 years ago
- Rule-creation tool for CiscoRouter Scanner☆16Dec 17, 2014Updated 11 years ago
- Ansible modules that use Netmiko☆11Dec 7, 2017Updated 8 years ago
- ☆12Jul 14, 2025Updated 10 months ago
- Python script to check the hashes of files in a directory against virustotal.com☆16May 12, 2015Updated 11 years ago
- ☆12Aug 5, 2015Updated 10 years ago
- Home router IDS solution with a Raspberry Pi 3. Dynamically resolves device name, manufacturer, and alerts user of Snort analytics throug…☆14Apr 4, 2019Updated 7 years ago
- ☆39Sep 25, 2023Updated 2 years ago
- ☆17May 21, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11Feb 17, 2025Updated last year
- ☆48Feb 21, 2021Updated 5 years ago
- parse Tor consensus to generate google maps and google earth KML of tor relays☆21Feb 20, 2018Updated 8 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆94Nov 29, 2024Updated last year
- reads a list of IP ranges in CIDR notation and prints the individual IP addresses.☆14Oct 6, 2016Updated 9 years ago
- System Call Integrity Layer - experimental security research☆27Apr 14, 2026Updated last month
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆15Apr 19, 2026Updated last month
- THOR APT Scanner User Manual☆21Updated this week
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Sep 11, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- Hunt malware with Volatility☆51Mar 3, 2026Updated 2 months ago
- Intentionally Vulnerable to Spring4Shell☆52Apr 1, 2022Updated 4 years ago
- A set of libraries and functions for simplifying automating Cisco devices through SecureCRT.☆13Nov 19, 2021Updated 4 years ago
- ☆16May 20, 2022Updated 4 years ago
- OMLASP (Ideas Locas)☆22Nov 10, 2022Updated 3 years ago
- AYY LMAO☆22Mar 26, 2016Updated 10 years ago