bi-zone / Log4j_DetectorLinks
Detection of Log4j in memory
☆39Updated 3 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below
Sorting:
- System of Orchestration, Lifecycle control, Detection and Response☆60Updated last year
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- Simple Authenticated Vulnerability Scanner for Linux hosts and Docker images☆44Updated 2 years ago
- OPA policies for securing Docker API☆11Updated 2 years ago
- ☆42Updated last year
- Orca - Targeted OSINT Framework☆90Updated last year
- A collection of nftables, multi routing scripts, port knocked, and iptables files. To get inspiration to make your own firewalls.☆90Updated 4 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 5 months ago
- Custom Russian WordList Generator☆45Updated 2 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆61Updated 4 years ago
- ☆12Updated 3 years ago
- Потом объясню, что это такое☆15Updated 7 years ago
- Enterprise Response Model & Common Knowledge☆38Updated 3 months ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆35Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Updated last year
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆29Updated last year
- ⛅️🔐 Security Requirements for Yandex.Cloud configuration: IAM, network access, key management, Kubernetes, audit logs.☆40Updated 4 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆97Updated 2 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago
- Chrome extension for SOC automations☆35Updated 2 weeks ago
- NTP Exfiltration Tool☆146Updated last year
- RedTeam network tool based on OrangePi R1☆23Updated 8 months ago
- Secrets scanner that understands code☆188Updated last year
- ☆21Updated 3 years ago
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- ☆13Updated last year
- Penguin OS Forensic (or Flight) Recorder☆41Updated 9 months ago
- ☆70Updated 4 years ago
- ☆229Updated last year
- Docker Compose Workspace manager☆16Updated 5 months ago