f5devcentral / cve-2020-5902-ioc-bigip-checker
☆17Updated 4 years ago
Alternatives and similar repositories for cve-2020-5902-ioc-bigip-checker:
Users that are interested in cve-2020-5902-ioc-bigip-checker are comparing it to the libraries listed below
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- ☆15Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- CSIRT Jump Bag☆26Updated 11 months ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Updated 4 years ago
- Corelight@Home script☆41Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 months ago
- ☆12Updated 5 years ago
- Windows Security Logging☆43Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- ☆65Updated 2 months ago
- Indicators of Normality☆12Updated 2 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- ☆41Updated last year
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆31Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 4 months ago
- C# User Simulation☆32Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago