cisagov / check-your-pulseLinks
This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.
☆28Updated 4 years ago
Alternatives and similar repositories for check-your-pulse
Users that are interested in check-your-pulse are comparing it to the libraries listed below
Sorting:
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- ☆33Updated 4 months ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- ☆24Updated 2 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- ☆21Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- ☆11Updated 4 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Setting up a training environment for MISP☆12Updated 2 years ago
- ☆13Updated 5 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 8 months ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- ☆30Updated 6 years ago