bi-zone / Log4j_DetectorLinks
Detection of Log4j in memory
☆40Updated 4 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below
Sorting:
- System of Orchestration, Lifecycle control, Detection and Response☆61Updated last year
- Harvest Linux forensic data for operational triage of an event.☆51Updated 2 weeks ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- Custom Russian WordList Generator☆45Updated 2 years ago
- ☆42Updated 2 years ago
- A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.☆92Updated 4 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆128Updated this week
- Orca - Targeted OSINT Framework☆88Updated 2 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 4 years ago
- RedTeam network tool based on OrangePi R1☆24Updated 10 months ago
- NTP Exfiltration Tool☆148Updated 2 years ago
- ☆13Updated 4 years ago
- Chrome extension for SOC automations☆37Updated 2 months ago
- ☆20Updated 4 years ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆91Updated 3 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Updated last year
- A repository with data about APTs☆13Updated 3 years ago
- Потом объясню, что это такое☆15Updated 7 years ago
- OPA policies for securing Docker API☆11Updated 2 years ago
- Enterprise Response Model & Common Knowledge☆39Updated 5 months ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- ☆70Updated 4 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆18Updated last year
- Secrets scanner that understands code☆191Updated 2 years ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆29Updated last year
- ☆21Updated 7 years ago