OpenIOC rules to facilitate hunting for indicators of compromise
☆37Jan 7, 2022Updated 4 years ago
Alternatives and similar repositories for CVE-2021-44228
Users that are interested in CVE-2021-44228 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote access and Antivirus Logging Database☆45Apr 27, 2026Updated last week
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆56May 1, 2026Updated last week
- ☆19Mar 23, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A list of RMMs designed to be used in automation to build alerts☆119Nov 9, 2025Updated 6 months ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- ☆15Dec 20, 2022Updated 3 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆76Aug 31, 2023Updated 2 years ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆48Feb 27, 2026Updated 2 months ago
- Collection of various documents, files, and binaries related to vintage computing☆21Jan 24, 2023Updated 3 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated last year
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Triaging Windows event logs based on SANS Poster☆47Nov 22, 2025Updated 5 months ago
- ☆15Dec 7, 2022Updated 3 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 3 years ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆867Jan 20, 2022Updated 4 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆225May 1, 2021Updated 5 years ago
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Dr. Disassembler☆38Jan 5, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Set of PoC to abuse Windows minifilters functionality☆76May 1, 2026Updated last week
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Apr 27, 2024Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- ☆49Oct 28, 2022Updated 3 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago