OpenIOC rules to facilitate hunting for indicators of compromise
☆37Jan 7, 2022Updated 4 years ago
Alternatives and similar repositories for CVE-2021-44228
Users that are interested in CVE-2021-44228 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote access and Antivirus Logging Database☆45Apr 28, 2024Updated last year
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- The scrip will help you to find some values info for the user that you need as DFIR☆16Nov 3, 2022Updated 3 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆55Apr 11, 2026Updated last week
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 4 months ago
- ROM Dumps of my retro hardwares☆16Dec 13, 2022Updated 3 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Lateral Movement and Data Access artifacts for Velociraptor☆17Dec 2, 2025Updated 4 months ago
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- ☆15Dec 20, 2022Updated 3 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆75Aug 31, 2023Updated 2 years ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated last month
- Collection of various documents, files, and binaries related to vintage computing☆21Jan 24, 2023Updated 3 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated last year
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- Triaging Windows event logs based on SANS Poster☆48Nov 22, 2025Updated 4 months ago
- Android Application of RTLion Framework☆22Jan 24, 2020Updated 6 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 3 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- A tool to decrypt and encrypt setting backup files (romfile.cfg) from certain ASUS routers.☆18Apr 2, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆867Jan 20, 2022Updated 4 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆224May 1, 2021Updated 4 years ago
- Lambda Extension for iamlive☆42May 17, 2021Updated 4 years ago
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- Test Interface for Multiple Embedded Protocols☆24Apr 9, 2026Updated last week
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago