arsolutioner / fortigate-belsen-leakView external linksLinks
Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
☆86Jan 16, 2025Updated last year
Alternatives and similar repositories for fortigate-belsen-leak
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below
Sorting:
- ☆10Jan 26, 2026Updated 2 weeks ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆42Updated this week
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- ☆50Feb 21, 2025Updated 11 months ago
- Here are some tools I developed to help analyze malware☆12Nov 8, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆13Jun 2, 2024Updated last year
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- Tool for decrypting and encrypting Pentium II microcode patches.☆29May 21, 2025Updated 8 months ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated 11 months ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆40Jan 31, 2026Updated last week
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Feb 5, 2026Updated last week
- ☆13Dec 24, 2023Updated 2 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- ☆16Dec 3, 2020Updated 5 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 7 months ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 3 months ago
- Parsers for .mdf file of Microsoft SQL Server (MSSQL)☆15Mar 28, 2020Updated 5 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 5 months ago
- azerty mod for badusb with roguemaster firmware☆12Jul 6, 2022Updated 3 years ago
- An academic Cyber Range☆21Updated this week
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- ☆12Jun 6, 2025Updated 8 months ago
- Sigma rules converted for direct use with Zircolite☆14Feb 5, 2026Updated last week
- Simple API for using the Python binding of gpt4all, utilizing the default models of the application. It can be used with the OpenAPI libr…☆13Jun 21, 2023Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 7 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 3 months ago
- ☆13Jun 27, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 3 years ago
- Dashboard de Monitoramento de Host☆24Sep 19, 2025Updated 4 months ago
- An efficient tool for extracting files, directories, and alternate data streams directly from NTFS image files.☆22Feb 21, 2024Updated last year
- 📧 [Research] E-Mail Injection: Vulnerable applications☆18May 26, 2024Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- ☆21Nov 19, 2025Updated 2 months ago