bi-zone / Log4j_DetectorLinks
Detection of Log4j in memory
☆40Updated 3 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below
Sorting:
- System of Orchestration, Lifecycle control, Detection and Response☆60Updated last year
- ☆42Updated last year
- OPA policies for securing Docker API☆11Updated last year
- A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.☆91Updated 3 years ago
- ☆17Updated 6 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- NTP Exfiltration Tool☆142Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 2 months ago
- Orca - Targeted OSINT Framework☆90Updated last year
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆45Updated 2 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 4 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆86Updated 9 months ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆20Updated 2 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆63Updated 7 months ago
- RedTeam network tool based on OrangePi R1☆23Updated 5 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- ☆11Updated 3 years ago
- Enterprise Response Model & Common Knowledge☆37Updated 2 weeks ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆16Updated 8 months ago
- ☆79Updated last week
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆34Updated this week
- LOKI2 - Simple IOC and YARA Scanner☆97Updated 2 weeks ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 10 months ago
- NFS client written in Go☆98Updated 2 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- A repository with data about APTs☆13Updated 2 years ago