Ansible role to detect Log4Shell exploitation attempts
☆18Dec 22, 2021Updated 4 years ago
Alternatives and similar repositories for ansible-role-log4shell-detector
Users that are interested in ansible-role-log4shell-detector are comparing it to the libraries listed below
Sorting:
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Running mirai botnet in lab environment☆10Apr 9, 2017Updated 8 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆95Feb 2, 2022Updated 4 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- Base infrastructure for future DevSecOps environment in AWS☆25Oct 21, 2020Updated 5 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Another Objective-C SQLite ORM☆24Apr 17, 2014Updated 11 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Dec 17, 2021Updated 4 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Auto-deploy to GitHub using WP2Static☆11May 18, 2019Updated 6 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Venom extension for Visual Studio Code☆11Aug 21, 2024Updated last year
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Cloud-Z gathers performance related information and benchmarks on cloud instances with support for multiple cloud providers.☆15Feb 18, 2023Updated 3 years ago
- PowerShellUtilities provides various utility commandlets.☆51Aug 3, 2020Updated 5 years ago
- ☆12Sep 15, 2025Updated 5 months ago
- xnu-3789.70.16☆40Sep 7, 2017Updated 8 years ago
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆42Oct 8, 2025Updated 5 months ago
- Learning assembly for linux-x86_64☆13Mar 18, 2016Updated 9 years ago