bi-zone / Log4j_DetectorLinks
Detection of Log4j in memory
☆40Updated 4 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below
Sorting:
- System of Orchestration, Lifecycle control, Detection and Response☆60Updated 2 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆128Updated this week
- Harvest Linux forensic data for operational triage of an event.☆51Updated 2 months ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆30Updated 2 years ago
- ☆42Updated 2 years ago
- A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.☆93Updated 4 years ago
- Orca - Targeted OSINT Framework☆88Updated 2 years ago
- OPA policies for securing Docker API☆11Updated 2 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 5 years ago
- ☆13Updated 4 years ago
- A repository with data about APTs☆13Updated 3 years ago
- Enterprise Response Model & Common Knowledge☆39Updated 7 months ago
- Потом объясню, что это такое☆15Updated 7 years ago
- Custom Russian WordList Generator☆45Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Updated 6 years ago
- NTP Exfiltration Tool☆148Updated 2 years ago
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Updated last year
- Official documentation for TheHive Project applications☆21Updated 2 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago
- Kubolt utility for scanning public kubernetes clusters☆110Updated last month
- ☆69Updated 4 years ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆90Updated 3 years ago
- Osquery Resources☆63Updated 6 years ago
- VulsRepo is visualized based on the json report output in vuls.☆36Updated 4 years ago
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- Chrome extension for SOC automations☆38Updated 4 months ago
- Monitoring for leaks of sensitive information in git repositories☆43Updated 2 years ago