entropyqueen / log4j_catcher
catch log4j exploits in the wild? maybe if we're lucky... .
☆16Updated last year
Alternatives and similar repositories for log4j_catcher:
Users that are interested in log4j_catcher are comparing it to the libraries listed below
- SNIcat☆126Updated 3 years ago
- Valhalla API Client☆68Updated 2 years ago
- Challenges for the TheManyHatsClub CTF☆11Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- Web Application for domain name monitoring / alerting☆63Updated 8 months ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- ☆13Updated 2 weeks ago
- Various capabilities for static malware analysis.☆77Updated 6 months ago
- XOR Key Extractor☆50Updated 7 months ago
- Website crawler with YARA detection☆88Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆127Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.☆159Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Lazarus analysis tools and research report☆56Updated last year
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆101Updated this week
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆20Updated this week
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆139Updated last year
- Client library for the mwdb service by CERT Polska.☆40Updated 4 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆87Updated last week
- Standardized Malware Analysis Tool☆52Updated 4 years ago
- A VS Code extension to preview XML nmap output☆44Updated last month
- Automatically create YARA rules from malicious documents.☆210Updated 2 years ago
- A pure python tool for finding and comparing typo-squatting, bytesqatting, and homoglyph domain attacks and brand impersonation☆38Updated 6 months ago
- C2 Active Scanner☆55Updated 9 months ago