arsolutioner / fortigate-belsen-leak
Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group
β87Updated 4 months ago
Alternatives and similar repositories for fortigate-belsen-leak
Users that are interested in fortigate-belsen-leak are comparing it to the libraries listed below
Sorting:
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β73Updated 3 weeks ago
- β74Updated last month
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integrationβ¦β14Updated this week
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)β66Updated last month
- β65Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logsβ120Updated 2 years ago
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024β38Updated 6 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β51Updated 6 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999β36Updated this week
- A collection of various SIEM rules relating to malware family groups.β66Updated 10 months ago
- Advanced Hunting Queriesβ17Updated 3 weeks ago
- Elastic version of SOC prime watcher rulesβ29Updated 7 months ago
- MISP to Sentinel integrationβ67Updated last month
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.β54Updated 4 months ago
- Slides of my public talksβ55Updated last year
- Security Scripts and Sources for daily usage.β59Updated last month
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboardβ78Updated 2 months ago
- VirtualGHOST Detection Toolβ91Updated 11 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β156Updated last month
- This repository is all about tips on ethical hacking and penetration testing!β45Updated this week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β194Updated 4 months ago
- CarbonBlack EDR detection rules and response actionsβ71Updated 8 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β47Updated last year
- A collection of CVEs weaponized by ransomware operatorsβ114Updated last week
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.β23Updated 2 weeks ago
- Simulation of Akira Ransomware with Invoke-AtomicTestβ14Updated 10 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ88Updated 6 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indiβ¦β103Updated 7 months ago
- Cyber threat intelligence tool suite.β35Updated last month
- Monitor your PingCastle scans to highlight the rule diff between two scansβ111Updated 9 months ago