corelight / ripple20Links
A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.
☆33Updated 2 years ago
Alternatives and similar repositories for ripple20
Users that are interested in ripple20 are comparing it to the libraries listed below
Sorting:
- Bro integration with osquery☆15Updated 2 years ago
- CVE2020-0796 SMBv3 RCE☆61Updated 5 years ago
- WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middlew…☆32Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- ☆35Updated last year
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- ☆53Updated 6 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Passive Security Tools Fingerprinting Framework☆73Updated 4 years ago
- This module detects HTTP requests that are non RFC compliant and used for smuggling☆12Updated 2 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Is this IP a C2 server?☆28Updated 5 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12Updated 4 years ago
- 威胁检测规则集☆15Updated 5 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Updated 6 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- A rogue DNS detector☆23Updated last year