dtact / divd-2021-00038--log4j-scannerLinks
Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar/zip/tar/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platfo…
☆47Updated 3 years ago
Alternatives and similar repositories for divd-2021-00038--log4j-scanner
Users that are interested in divd-2021-00038--log4j-scanner are comparing it to the libraries listed below
Sorting:
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆52Updated 2 years ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 11 months ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- ☆48Updated last week
- This repo contains information on how to auto deploy Sysmon via GPO and Task Scheduler☆12Updated 3 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆42Updated 3 months ago
- ☆17Updated 4 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated last month
- Converts Netwitness log parser configuration to Logstash configuration☆20Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Pep up your Windows Event Collector (WEC) for Windows Event Forwarding (WEF)☆19Updated 3 years ago
- ☆18Updated 3 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- ☆15Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated last month
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- Ansible modules for the Graylog API☆62Updated 4 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Official documentation for TheHive Project applications☆21Updated last year
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- CrowdStrike Archive Scan Tool☆85Updated 3 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago