fireeye / CVE-2021-44228View external linksLinks
OpenIOC rules to facilitate hunting for indicators of compromise
☆37Jan 7, 2022Updated 4 years ago
Alternatives and similar repositories for CVE-2021-44228
Users that are interested in CVE-2021-44228 are comparing it to the libraries listed below
Sorting:
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 2 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 3 months ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 3 months ago
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 2 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Feb 6, 2026Updated last week
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago
- Terraform module for Policy Sentry.☆26Nov 10, 2020Updated 5 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 10 months ago
- ☆207Dec 13, 2023Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- ☆22Jul 7, 2023Updated 2 years ago
- A community sourced list of log4j-affected software☆1,123Nov 9, 2022Updated 3 years ago
- Active C&C Detector☆155Oct 5, 2023Updated 2 years ago
- A crowdsourced Google Cloud IAM permissions reference.☆25Jul 9, 2025Updated 7 months ago
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Sep 16, 2022Updated 3 years ago
- A collection of ICS/SCADA PCAPs☆30Feb 6, 2020Updated 6 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- A simple C# (Windows Forms) application for measuring angles between any objects on the screen.☆15Dec 2, 2025Updated 2 months ago
- ☆12Feb 2, 2026Updated last week
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆37Mar 10, 2024Updated last year
- Utilities and scripts that use the NMC API for operations and reporting.☆15Jan 13, 2026Updated last month
- High-performance open-source orchestration utility that utilizes EBS Direct APIs to efficiently clone, copy and migrate EBS snapshots to …☆39Dec 11, 2024Updated last year
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- JA3 TLS Fingerprint database☆81Nov 11, 2019Updated 6 years ago
- Zeek network security monitor plugin that enables parsing of the BACnet standard building controls protocol☆30Apr 23, 2025Updated 9 months ago
- ICS Security Labs☆38Mar 27, 2021Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Jun 1, 2023Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆46Nov 22, 2025Updated 2 months ago
- Python / Scapy tool to analyze and interact with IEC 61850 Goose traffic☆37Dec 15, 2021Updated 4 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆226May 1, 2021Updated 4 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Repo for my scripts that I've made for work done, not all are functional, some are abandoned or WIP.☆10Jan 9, 2026Updated last month
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- A template tool with no dependencies that works like Helm templates or Consul templates.☆17Jan 14, 2026Updated last month
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆861Jan 20, 2022Updated 4 years ago