authomize / log4j-log4shell-affected
Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability
☆55Updated 3 years ago
Alternatives and similar repositories for log4j-log4shell-affected
Users that are interested in log4j-log4shell-affected are comparing it to the libraries listed below
Sorting:
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Kerberoast Detection Script☆30Updated 6 months ago
- ☆39Updated 2 years ago
- ☆74Updated 11 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆36Updated 3 weeks ago
- ☆42Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- ☆38Updated 3 years ago
- Look into EDR events from network☆23Updated 2 weeks ago
- BloodHound with a twist of cloud☆78Updated 4 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Public IoCs about log4j CVE-2021-44228☆9Updated 3 years ago
- Simulates a compromise in a cloud and container environment☆32Updated 5 months ago
- ☆18Updated 2 years ago
- ☆82Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 5 months ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Azure AD enumeration over MS Graph☆81Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- ☆80Updated 2 years ago
- Ingest openldap data into bloodhound☆80Updated 4 years ago
- ☆19Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆91Updated 2 years ago