bi-zone / Log4j_DetectorLinks
Detection of Log4j in memory
☆40Updated 4 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below
Sorting:
- System of Orchestration, Lifecycle control, Detection and Response☆60Updated 2 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated 2 months ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆128Updated this week
- ☆42Updated 2 years ago
- Orca - Targeted OSINT Framework☆88Updated 2 years ago
- Потом объясню, что это такое☆15Updated 7 years ago
- OPA policies for securing Docker API☆11Updated 2 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 5 years ago
- Enterprise Response Model & Common Knowledge☆39Updated 7 months ago
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆30Updated 2 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Updated last year
- ☆13Updated 4 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- Various blog post projects.☆25Updated 2 months ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 5 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 4 months ago
- A repository with data about APTs☆13Updated 3 years ago
- Custom Russian WordList Generator☆45Updated 3 years ago
- ☆69Updated 4 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Updated 6 years ago
- ☆21Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated last year
- NTP Exfiltration Tool☆148Updated 2 years ago
- Chrome extension for SOC automations☆38Updated 4 months ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year