arsolutioner / fortigate-belsen-leak
Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
β85Updated last month
Alternatives and similar repositories for fortigate-belsen-leak:
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β68Updated last month
- ThreatSeeker: Threat Hunting via Windows Event Logsβ118Updated last year
- β74Updated last week
- β65Updated last year
- A collection of various SIEM rules relating to malware family groups.β65Updated 8 months ago
- VirtualGHOST Detection Toolβ89Updated 9 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β151Updated 9 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.β226Updated last month
- Slides of my public talksβ54Updated last year
- MS Graph Commands and Tools for Blue Teamersβ49Updated last year
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eveβ¦β116Updated this week
- Security Scripts and Sources for daily usage.β52Updated last week
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to theirβ¦β24Updated 3 months ago
- β46Updated 3 weeks ago
- HookPhish is a Python script designed to aid in the detection of phishing websitesβ35Updated last year
- β61Updated last year
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024β37Updated 3 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β191Updated last month
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β51Updated 3 months ago
- Hunting Queries for Defender ATPβ80Updated 3 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β59Updated 7 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.β43Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scansβ110Updated 6 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β51Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β118Updated 10 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ75Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor manβs SOC.β51Updated last month
- β32Updated 3 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Serviceβ28Updated 4 months ago