Ripple20 Critical Vulnerabilities - Detection Logic and Signatures
☆12May 28, 2021Updated 4 years ago
Alternatives and similar repositories for Ripple-20-Detection-Logic
Users that are interested in Ripple-20-Detection-Logic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Treck Network Stack Discovery Tool by JSOF☆34Jun 30, 2020Updated 5 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Bro Detection Scripts☆10Mar 9, 2021Updated 5 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- setup zeek, previously Bro IDS☆18Feb 5, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Generates fake upload on torrent trackers☆13May 27, 2019Updated 6 years ago
- Coinspect Publications: audit reports and research.☆15Aug 14, 2025Updated 7 months ago
- Anomaly Detection using SH-ESD☆10Feb 6, 2019Updated 7 years ago
- Grey Haven's centralized repository for Claude Code agents, commands, and configs☆23Feb 17, 2026Updated last month
- Zeek package for tracking long connections to report them before they have completed.☆31Nov 25, 2025Updated 4 months ago
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated last month
- ☆18Jun 28, 2020Updated 5 years ago
- Treck Network Stack Discovery Tool [Ripple20]☆12Jul 1, 2020Updated 5 years ago
- LSI 9211-8i IT-mode (firmware) flashing USB☆23Nov 7, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Harness for fuzzing GoldSrc file formats with WinAFL☆20Apr 26, 2020Updated 5 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- ☆18Dec 20, 2024Updated last year
- ELK roles & profiles with Puppet☆14Feb 28, 2020Updated 6 years ago
- WooYun Drops Markdown☆14Jun 28, 2020Updated 5 years ago
- THOR Thunderstorm Collectors☆25Mar 18, 2026Updated last week
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- everything about llm based agent☆24Dec 19, 2025Updated 3 months ago
- Full pipeline for log analysis and anomaly detection.☆18Feb 11, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- PyTest Salt Plugin☆13Jan 27, 2020Updated 6 years ago
- suricata rules☆18Dec 26, 2024Updated last year
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- Generate social media preview images (Open Graph) and configure all meta tags for optimal sharing on Twitter/X, LinkedIn, Facebook, Slack…☆59Jan 27, 2026Updated 2 months ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Apr 16, 2019Updated 6 years ago
- Application and service identification rules for Suricata☆19Nov 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Fastjson反序列化环境(一步步)☆14Jun 17, 2022Updated 3 years ago
- keras2+tensorflow+jupyter+flask+openslide+node+npm+gpu☆18Dec 1, 2017Updated 8 years ago
- ✨ Brand Indicators for Message Identification or BIMI ( 📢 pronounced: Bih-mee) is an emerging email 📧 specification that enables the us…☆10Mar 6, 2024Updated 2 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- ☆10Aug 8, 2017Updated 8 years ago
- Automatically generate patterns that exploit compression in jpgs☆32Sep 1, 2014Updated 11 years ago