bi-zone / Log4j_DetectorLinks
Detection of Log4j in memory
☆40Updated 4 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below
Sorting:
- System of Orchestration, Lifecycle control, Detection and Response☆61Updated last year
- Extensible framework for analyzing publicly available information about vulnerabilities☆128Updated this week
- Harvest Linux forensic data for operational triage of an event.☆51Updated 2 weeks ago
- Orca - Targeted OSINT Framework☆88Updated 2 years ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- OPA policies for securing Docker API☆11Updated 2 years ago
- A repository with data about APTs☆13Updated 3 years ago
- Custom Russian WordList Generator☆45Updated 2 years ago
- ☆42Updated 2 years ago
- A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.☆92Updated 4 years ago
- Потом объясню, что это такое☆15Updated 7 years ago
- Enterprise Response Model & Common Knowledge☆39Updated 5 months ago
- ☆70Updated 4 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 4 years ago
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆29Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- Chrome extension for SOC automations☆37Updated 2 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 2 months ago
- Automatic detection engineering technical state compliance☆55Updated last year
- ☆13Updated 4 years ago
- Secrets scanner that understands code☆191Updated 2 years ago
- ⛅️🔐 Security Requirements for Yandex.Cloud configuration: IAM, network access, key management, Kubernetes, audit logs.☆41Updated 4 years ago
- ☆20Updated 4 years ago
- Defensomania is a security monitoring and incident response card game.☆63Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer☆217Updated 5 years ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago