Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
☆86Jan 16, 2025Updated last year
Alternatives and similar repositories for fortigate-belsen-leak
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jul 5, 2021Updated 4 years ago
- ☆51Feb 21, 2025Updated last year
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Updated this week
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆42Mar 16, 2026Updated last week
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Dashboard de Monitoramento de Host☆25Sep 19, 2025Updated 6 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 5 months ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆19Dec 11, 2025Updated 3 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- KQL Sentinel and Defender Detection and Hunting Queries.☆16Feb 24, 2026Updated 3 weeks ago
- Sigma rules converted for direct use with Zircolite☆14Mar 16, 2026Updated last week
- ☆19Jan 12, 2024Updated 2 years ago
- KQL Queries☆34Feb 17, 2026Updated last month
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Security Scripts and Sources for daily usage.☆72Jan 25, 2026Updated last month
- Yet another Ransomware gang tracker☆565Mar 12, 2026Updated last week
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- ☆17May 28, 2022Updated 3 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- FOR508 Index - GCFA☆24May 19, 2018Updated 7 years ago
- ☆11Updated this week
- ☆19Dec 18, 2024Updated last year
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- AI voice assistant that uses Twilio Voice and ConversationRelay, and the Google Gemini API to engage in two-way conversations over a phon…☆25Feb 19, 2026Updated last month
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆19Jun 17, 2024Updated last year
- LotL RMM☆317Mar 13, 2026Updated last week
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 9 months ago
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated last year