arsolutioner / fortigate-belsen-leakLinks
Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
β86Updated 11 months ago
Alternatives and similar repositories for fortigate-belsen-leak
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below
Sorting:
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β81Updated 8 months ago
- β74Updated last week
- ThreatSeeker: Threat Hunting via Windows Event Logsβ123Updated 2 years ago
- ASR Configurator, Essentials and Atomic Testingβ98Updated 8 months ago
- DShield Sensor Log Collection with ELKβ46Updated last week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β197Updated last month
- God Mode Detection Rulesβ134Updated last year
- MS Graph Commands and Tools for Blue Teamersβ52Updated 2 years ago
- VirtualGHOST Detection Toolβ101Updated 3 weeks ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β160Updated 8 months ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.β57Updated 6 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β50Updated 4 months ago
- Cloudformation Template to Launch the SOC from Kali Purpleβ53Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.β35Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β69Updated 2 years ago
- β67Updated 2 years ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β59Updated 5 months ago
- β52Updated 4 months ago
- A runbook for handling security incidents in cooperation with 0xsyr0β52Updated 3 years ago
- β56Updated 11 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.β18Updated 6 months ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integrationβ¦β17Updated 7 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTestβ18Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ84Updated last year
- π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Goβ¦β81Updated 4 months ago
- Linux Baseline and Forensic Triage Tool - BETAβ57Updated 3 years ago
- A collection of various SIEM rules relating to malware family groups.β70Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-β¦β106Updated 2 years ago
- Sniffing out well-known threat groupsβ64Updated last year
- β28Updated 2 years ago