arsolutioner / fortigate-belsen-leakLinks
Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
β86Updated 8 months ago
Alternatives and similar repositories for fortigate-belsen-leak
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below
Sorting:
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β78Updated 4 months ago
- β74Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logsβ123Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β49Updated 3 weeks ago
- ASR Configurator, Essentials and Atomic Testingβ91Updated 5 months ago
- A runbook for handling security incidents in cooperation with 0xsyr0β51Updated 2 years ago
- Sniffing out well-known threat groupsβ61Updated last year
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β57Updated 2 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β157Updated 5 months ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integrationβ¦β17Updated 4 months ago
- VirtualGHOST Detection Toolβ92Updated last year
- β26Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamersβ50Updated last year
- God Mode Detection Rulesβ134Updated last year
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.β55Updated 3 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999β58Updated this week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β197Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β62Updated last year
- β47Updated 5 months ago
- A collection of various SIEM rules relating to malware family groups.β69Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β68Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.β145Updated this week
- Slides of my public talksβ56Updated last year
- A collection of CVEs weaponized by ransomware operatorsβ123Updated last month
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-β¦β105Updated 2 years ago
- Analyze pcaps with Zeek and a Grafana Dashboardβ182Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTestβ17Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation toolsβ¦β117Updated last week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.β48Updated 4 months ago