r0mdau / ansible-role-log4shell-detectorLinks
Ansible role to detect Log4Shell exploitation attempts
☆18Updated 4 years ago
Alternatives and similar repositories for ansible-role-log4shell-detector
Users that are interested in ansible-role-log4shell-detector are comparing it to the libraries listed below
Sorting:
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- ☆70Updated 2 years ago
- ☆15Updated 4 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- ☆33Updated 7 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- ☆19Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 3 years ago
- ☆80Updated 2 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Updated 3 years ago
- Windows Security Logging☆43Updated 3 years ago
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 4 years ago
- ☆23Updated 10 months ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆16Updated last year
- Kerberoast Detection Script☆30Updated last year
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆94Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 4 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 3 years ago
- Collection of Slides From My Conference Talks☆20Updated 3 years ago
- ☆10Updated 5 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆22Updated 5 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago