arsolutioner / fortigate-belsen-leak
Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
β87Updated 2 months ago
Alternatives and similar repositories for fortigate-belsen-leak:
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below
- β65Updated last year
- A collection of various SIEM rules relating to malware family groups.β65Updated 9 months ago
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β71Updated 2 months ago
- Hunting Queries for Defender ATPβ81Updated last week
- β74Updated this week
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboardβ75Updated 2 weeks ago
- ThreatSeeker: Threat Hunting via Windows Event Logsβ120Updated last year
- CarbonBlack EDR detection rules and response actionsβ71Updated 6 months ago
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.β22Updated 7 months ago
- VirtualGHOST Detection Toolβ90Updated 10 months ago
- β61Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β153Updated 10 months ago
- Security Scripts and Sources for daily usage.β55Updated last week
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024β37Updated 4 months ago
- β46Updated 2 weeks ago
- God Mode Detection Rulesβ134Updated 7 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory Cβ¦β250Updated last year
- Slides of my public talksβ54Updated last year
- Elastic version of SOC prime watcher rulesβ29Updated 5 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.β183Updated 8 months ago
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)β52Updated last month
- MISP to Sentinel integrationβ63Updated 3 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigationsβ84Updated 7 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Serviceβ29Updated 6 months ago
- SIEM Cheat Sheetβ73Updated last year
- MS Graph Commands and Tools for Blue Teamersβ49Updated last year
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.β52Updated 2 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indiβ¦β101Updated 5 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β47Updated 11 months ago
- A list of resources to build a information security team.β13Updated 4 years ago