A collection of intelligence about Log4Shell and its exploitation activity.
☆183Mar 4, 2022Updated 4 years ago
Alternatives and similar repositories for Log4Shell-IOCs
Users that are interested in Log4Shell-IOCs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Dec 22, 2020Updated 5 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated 2 years ago
- ☆96Apr 8, 2026Updated last month
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Dec 20, 2021Updated 4 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆123Mar 4, 2026Updated 2 months ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆306Nov 13, 2021Updated 4 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,887Jun 15, 2022Updated 3 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Jan 31, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆508Oct 7, 2024Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 5 months ago
- Detector for Log4Shell exploitation attempts☆727Feb 12, 2022Updated 4 years ago
- Sophos-originated indicators-of-compromise from published reports☆663May 14, 2026Updated last week
- Tools for hunting for threats.☆601Apr 30, 2025Updated last year
- BlackBerry Threat Research & Intelligence☆99Oct 20, 2023Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Dec 9, 2022Updated 3 years ago
- Repository of public reference frameworks for the DFIR community.☆122Jul 4, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆936Jun 26, 2023Updated 2 years ago
- ☆44Jul 11, 2025Updated 10 months ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆659Updated this week
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Configuration Extractor for BlackCat Ransomware☆29Mar 18, 2022Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- ☆130Jan 29, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆27Sep 6, 2024Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆652Jun 19, 2024Updated last year
- ☆33Feb 26, 2022Updated 4 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 3 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year