corelight / ripple20Links
A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.
☆33Updated 2 years ago
Alternatives and similar repositories for ripple20
Users that are interested in ripple20 are comparing it to the libraries listed below
Sorting:
- Bro integration with osquery☆15Updated 2 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- ☆41Updated 2 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated 2 years ago
- ☆35Updated last year
- ☆43Updated 2 years ago
- CVE2020-0796 SMBv3 RCE☆61Updated 5 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆154Updated 2 months ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- ☆38Updated last year
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- A rogue DNS detector☆23Updated last year
- A tool to assess data quality, built on top of the awesome OSSEM.☆78Updated 2 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- This module detects HTTP requests that are non RFC compliant and used for smuggling☆12Updated 2 years ago
- ☆53Updated 6 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Updated 6 years ago
- Suricata rule and intel index☆31Updated 3 months ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Static Token And Credential Scanner☆96Updated 2 years ago