bi-zone / Log4j_DetectorLinks
Detection of Log4j in memory
☆39Updated 3 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below
Sorting:
- System of Orchestration, Lifecycle control, Detection and Response☆59Updated last year
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- Custom Russian WordList Generator☆45Updated 2 years ago
- ☆42Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 3 months ago
- A repository with data about APTs☆13Updated 2 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- Orca - Targeted OSINT Framework☆90Updated last year
- OPA policies for securing Docker API☆11Updated 2 years ago
- ⛅️🔐 Security Requirements for Yandex.Cloud configuration: IAM, network access, key management, Kubernetes, audit logs.☆40Updated 4 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆61Updated 4 years ago
- Потом объясню, что это такое☆15Updated 7 years ago
- NTP Exfiltration Tool☆145Updated last year
- Enterprise Response Model & Common Knowledge☆38Updated 2 months ago
- ☆11Updated 3 years ago
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆97Updated 2 years ago
- Osquery Resources☆62Updated 6 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆17Updated 9 months ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated last year
- Chrome extension for SOC automations☆35Updated last month
- Official documentation for TheHive Project applications☆21Updated last year
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆91Updated 3 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆55Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆63Updated 9 months ago
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆28Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Cisco IOS Security Inspector☆34Updated 3 weeks ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year