cisagov / check-your-pulse
This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.
☆28Updated 4 years ago
Alternatives and similar repositories for check-your-pulse:
Users that are interested in check-your-pulse are comparing it to the libraries listed below
- ☆11Updated 4 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- ☆34Updated last month
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 4 years ago
- CLI tools using Harpoon features☆21Updated last year
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- repo for sharing stuff☆16Updated last year
- ☆21Updated last year
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 4 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 3 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- ☆24Updated last year
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- THOR MITRE ATT&CK Framework Coverage☆24Updated 4 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- ☆33Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago