bi-zone / Log4j_DetectorLinks
Detection of Log4j in memory
☆40Updated 4 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below
Sorting:
- System of Orchestration, Lifecycle control, Detection and Response☆61Updated 2 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆128Updated 2 weeks ago
- A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.☆92Updated 4 years ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- Harvest Linux forensic data for operational triage of an event.☆52Updated 3 weeks ago
- OPA policies for securing Docker API☆11Updated 2 years ago
- Orca - Targeted OSINT Framework☆88Updated 2 years ago
- ☆42Updated 2 years ago
- Osquery Resources☆63Updated 6 years ago
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- Enterprise Response Model & Common Knowledge☆39Updated 5 months ago
- NTP Exfiltration Tool☆148Updated 2 years ago
- A repository with data about APTs☆13Updated 3 years ago
- Chrome extension for SOC automations☆37Updated 2 months ago
- Custom Russian WordList Generator☆45Updated 2 years ago
- Потом объясню, что это такое☆15Updated 7 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Updated last year
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 5 years ago
- Secrets scanner that understands code☆191Updated 2 years ago
- ☆13Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆18Updated last year
- ☆31Updated 2 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago
- Penguin OS Forensic (or Flight) Recorder☆41Updated last year
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆91Updated 3 years ago
- ☆70Updated 4 years ago
- VulsRepo is visualized based on the json report output in vuls.☆36Updated 4 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago