bi-zone / Log4j_DetectorLinks
Detection of Log4j in memory
☆40Updated 4 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below
Sorting:
- System of Orchestration, Lifecycle control, Detection and Response☆60Updated 2 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated last month
- Extensible framework for analyzing publicly available information about vulnerabilities☆127Updated last month
- ☆42Updated 2 years ago
- A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.☆93Updated 4 years ago
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆57Updated 2 years ago
- Orca - Targeted OSINT Framework☆88Updated 2 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Updated last year
- Osquery Resources☆63Updated 6 years ago
- Chrome extension for SOC automations☆37Updated 3 months ago
- Enterprise Response Model & Common Knowledge☆39Updated 6 months ago
- Потом объясню, что это такое☆15Updated 7 years ago
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆30Updated last year
- A repository with data about APTs☆13Updated 3 years ago
- Custom Russian WordList Generator☆45Updated 2 years ago
- ☆69Updated 4 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 5 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 3 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated last year
- ☆20Updated 4 years ago
- OPA policies for securing Docker API☆11Updated 2 years ago
- Secrets scanner that understands code☆192Updated 2 years ago
- ☆13Updated 4 years ago
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- THOR Thunderstorm Collectors☆25Updated 2 weeks ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- MP SIEM SDK☆30Updated last month