intezer / log4jscanLinks
☆57Updated 4 years ago
Alternatives and similar repositories for log4jscan
Users that are interested in log4jscan are comparing it to the libraries listed below
Sorting:
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 5 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆108Updated last year
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- A tool designed to hunt for Phishing Kit source code☆229Updated 2 weeks ago
- Valhalla API Client☆70Updated 3 weeks ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆93Updated 2 years ago
- ☆121Updated 2 weeks ago
- SANS Slingshot Linux Distribution☆56Updated 5 years ago
- My Jupyter Notebooks☆36Updated 10 months ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 4 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Updated 2 years ago
- Hunt malware with Volatility☆47Updated 7 months ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Wrap any binary into a cached webserver☆57Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Tenable Nessus and Tenable Security Center, and exports results to a spreadshe…☆110Updated 2 weeks ago
- Fast IOC and YARA Scanner☆89Updated 5 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago