cisagov / check-your-pulse
This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.
☆28Updated 4 years ago
Alternatives and similar repositories for check-your-pulse:
Users that are interested in check-your-pulse are comparing it to the libraries listed below
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆57Updated 6 months ago
- python wrapper to use tshark for file extraction from the command line.☆27Updated 6 years ago
- ☆24Updated 2 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Atomic Red Team App for Phantom☆16Updated 4 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Analytics for Accounting logs from Network devices☆17Updated 3 years ago
- ☆20Updated 4 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- ☆22Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Updated 4 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- A series of Bro Scripts created for detection purposes.☆19Updated 8 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- CLI tools using Harpoon features☆21Updated last year
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year