Detection of Log4j in memory
☆40Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for Log4j_Detector
Users that are interested in Log4j_Detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tasks from CTFZone 2017 quals☆12Jul 19, 2017Updated 8 years ago
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆21Sep 10, 2025Updated 6 months ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Jul 26, 2024Updated last year
- A powershell parser for https://github.com/ufrisk/MemProcFS☆45May 12, 2021Updated 4 years ago
- Konrads' Pen-Ultimate (Windows) Log File Parser☆14Dec 27, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- ☆10Dec 19, 2024Updated last year
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- 3wifi fork☆11Aug 22, 2023Updated 2 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- ☆20May 10, 2023Updated 2 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ☆13Sep 15, 2024Updated last year
- "its like OAB in python because snake"☆17Feb 5, 2018Updated 8 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 3 months ago
- ☆10May 15, 2022Updated 3 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Rarime is a MetaMask Snap that safely holds any of your credentials and allows you to prove your identity without revealing any personal …☆12Oct 10, 2025Updated 5 months ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Golang Parser for Microsoft Event Logs☆107Nov 7, 2025Updated 4 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Auxiliator is telegram bot for basic web-application analysis☆12Apr 24, 2024Updated last year
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- geolocate ip addresses in IIS logs☆20Jan 8, 2025Updated last year
- Go Dark☆24Nov 23, 2025Updated 4 months ago
- Just a stand to store all your Raspberry Pi CM4☆20Jul 12, 2022Updated 3 years ago
- Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and sec…☆42Jul 19, 2025Updated 8 months ago
- An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain join…☆18Mar 15, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Jul 17, 2022Updated 3 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆21Nov 12, 2024Updated last year
- ☆22Sep 17, 2022Updated 3 years ago
- OPA policies for securing Docker API☆11Aug 14, 2023Updated 2 years ago
- Build grafana dashboards from k8s audit logs☆29Jan 15, 2026Updated 2 months ago
- ☆19Dec 5, 2024Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago