entropyqueen / log4j_catcherLinks
catch log4j exploits in the wild? maybe if we're lucky... .
☆16Updated 2 years ago
Alternatives and similar repositories for log4j_catcher
Users that are interested in log4j_catcher are comparing it to the libraries listed below
Sorting:
- Malware repository component for samples & static configuration with REST API interface.☆369Updated this week
 - Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
 - Malduck is your ducky companion in malware analysis journeys☆346Updated 4 months ago
 - Because phishtank was taken.. explore phishing kits in a contained environment!☆48Updated 3 years ago
 - Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
 - A tool designed to hunt for Phishing Kit source code☆225Updated 2 years ago
 - Distributed malware processing framework based on Python, Redis and S3.☆444Updated 3 weeks ago
 - Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆99Updated 6 months ago
 - For all these times you're asking yourself "what is this panel again?"☆258Updated 2 years ago
 - A phishing kit collector for scavengers☆219Updated last week
 - A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆140Updated last year
 - ☆15Updated this week
 - Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆69Updated last week
 - Web Application for domain name monitoring / alerting☆64Updated last year
 - repository of tools & resources of the MMD team☆136Updated 3 years ago
 - This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
 - Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆238Updated 2 years ago
 - Threat Intel Platform for T-POTs☆158Updated last week
 - Repository of Yara rules dedicated to Phishing Kits Zip files☆233Updated 2 weeks ago
 - Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆45Updated 3 years ago
 - Various capabilities for static malware analysis.☆79Updated last year
 - Valhalla API Client☆70Updated 2 years ago
 - acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆110Updated 2 weeks ago
 - Hatching Triage public command-line utility and API library.☆73Updated 2 years ago
 - Website crawler with YARA detection☆90Updated 2 years ago
 - Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
 - SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
 - Malware similarity platform with modularity in mind.☆78Updated 4 years ago
 - Tool to analyze and detect MITM phishing toolkits on the web.☆83Updated 3 years ago
 - Ransomware leak site monitoring☆316Updated 3 years ago