Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
☆85Jan 16, 2025Updated last year
Alternatives and similar repositories for fortigate-belsen-leak
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆51Feb 21, 2025Updated last year
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated 3 weeks ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆45Updated this week
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Dashboard de Monitoramento de Host☆25Sep 19, 2025Updated 6 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆37Oct 21, 2025Updated 5 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- KQL Sentinel and Defender Detection and Hunting Queries.☆16Feb 24, 2026Updated last month
- Sigma rules converted for direct use with Zircolite☆14Apr 9, 2026Updated last week
- ☆19Jan 12, 2024Updated 2 years ago
- KQL Queries☆34Mar 19, 2026Updated 3 weeks ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Security Scripts and Sources for daily usage.☆73Jan 25, 2026Updated 2 months ago
- Yet another Ransomware gang tracker☆571Apr 7, 2026Updated last week
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- ☆17May 28, 2022Updated 3 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11Mar 18, 2026Updated 3 weeks ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- ☆19Dec 18, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆20Nov 13, 2025Updated 5 months ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PAN-OS auth bypass + RCE☆46Nov 19, 2024Updated last year
- Random Exploits☆51Sep 12, 2023Updated 2 years ago
- An efficient tool for extracting files, directories, and alternate data streams directly from NTFS image files.☆22Mar 30, 2026Updated 2 weeks ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated 2 years ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago