arsolutioner / fortigate-belsen-leakLinks
Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
β86Updated 10 months ago
Alternatives and similar repositories for fortigate-belsen-leak
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below
Sorting:
- β74Updated this week
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β79Updated 6 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logsβ123Updated 2 years ago
- ASR Configurator, Essentials and Atomic Testingβ99Updated 7 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β59Updated 4 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β68Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β49Updated 2 months ago
- β52Updated 3 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β159Updated 7 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β197Updated 2 weeks ago
- God Mode Detection Rulesβ134Updated last year
- VirtualGHOST Detection Toolβ96Updated last year
- MS Graph Commands and Tools for Blue Teamersβ51Updated 2 years ago
- Cyber threat intelligence tool suite.β42Updated 7 months ago
- DShield Sensor Log Collection with ELKβ43Updated this week
- Assess Windows OS for security misconfigurations and hardening opportunities.β34Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0β52Updated 3 years ago
- CarbonBlack EDR detection rules and response actionsβ73Updated last year
- β67Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.β57Updated 5 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTestβ17Updated last year
- β35Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999β104Updated this week
- Linux Baseline and Forensic Triage Tool - BETAβ57Updated 3 years ago
- Extracting IoC data from eMailβ138Updated 3 months ago
- A collection of various SIEM rules relating to malware family groups.β70Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β62Updated last year
- Slides of my public talksβ56Updated last year
- β55Updated 9 months ago