arsolutioner / fortigate-belsen-leak
Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
β87Updated 3 months ago
Alternatives and similar repositories for fortigate-belsen-leak:
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β72Updated this week
- β74Updated 3 weeks ago
- A collection of various SIEM rules relating to malware family groups.β66Updated 10 months ago
- VirtualGHOST Detection Toolβ91Updated 11 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboardβ78Updated last month
- Elastic version of SOC prime watcher rulesβ29Updated 6 months ago
- β65Updated last year
- Slides of my public talksβ55Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β154Updated 2 weeks ago
- CarbonBlack EDR detection rules and response actionsβ71Updated 7 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β47Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logsβ120Updated last year
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024β38Updated 5 months ago
- Security Scripts and Sources for daily usage.β58Updated 2 weeks ago
- Monitor your PingCastle scans to highlight the rule diff between two scansβ111Updated 8 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indiβ¦β103Updated 6 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ87Updated 5 months ago
- This repository is all about tips on ethical hacking and penetration testing!β44Updated last week
- β47Updated last week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β51Updated 6 months ago
- Track C2 servers, tools, and botnets over time by framework and locationβ38Updated 2 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websitesβ35Updated last year
- Hunting Queries for Defender ATPβ81Updated last week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β122Updated last year
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)β65Updated 2 weeks ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endpβ¦β38Updated last year
- MS Graph Commands and Tools for Blue Teamersβ49Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999β14Updated this week
- A list of resources to build a information security team.β13Updated 4 years ago
- God Mode Detection Rulesβ134Updated 8 months ago