log4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)
☆36Jan 7, 2022Updated 4 years ago
Alternatives and similar repositories for log4shell_ioc_ips
Users that are interested in log4shell_ioc_ips are comparing it to the libraries listed below
Sorting:
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- A Rust library for evaluating log4j substitution queries in order to determine whether or not malicious queries may exist.☆20Apr 25, 2022Updated 3 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆120Apr 14, 2021Updated 4 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- Cobalt Strike < 4.4 dos CVE-2021-36798☆37Aug 19, 2021Updated 4 years ago
- Test google/or-tools java packages☆13Jan 16, 2026Updated last month
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Jan 7, 2022Updated 4 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- Sample files for Control Things Platform☆43Updated this week
- AlienVault Open Threat Exchange App For Splunk☆10May 6, 2014Updated 11 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Corsaro is a software suite for performing large-scale analysis of trace data. It was specifically designed to be used with passive trace…☆12Jan 30, 2020Updated 6 years ago
- Fetches security vulnerabilities and creates pip-constraints based on them.☆12Jan 27, 2025Updated last year
- URL Feature extraction and Engineering aided with Classification via Neural Networks☆11Dec 11, 2021Updated 4 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- ☆12Aug 27, 2025Updated 6 months ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Argon2 key derivation for Ruby☆11Feb 19, 2026Updated 2 weeks ago
- ☆14Updated this week
- ☆10Jul 29, 2016Updated 9 years ago
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Mar 8, 2022Updated 4 years ago
- MIRROR of https://codeberg.org/catseye/hatoucan : A tokenizer for Commodore BASIC 2.0 programs☆10Nov 3, 2023Updated 2 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- A collection of tools for the Janus exploit [CVE-2017-13156].☆10Oct 22, 2019Updated 6 years ago
- ☆10Dec 26, 2022Updated 3 years ago
- An open-source music transcription application.☆12Sep 9, 2023Updated 2 years ago
- ☆11Dec 31, 2018Updated 7 years ago
- ☆12Aug 5, 2015Updated 10 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆10Dec 24, 2022Updated 3 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year