thomaspatzke / Log4Pot
A honeypot for the Log4Shell vulnerability (CVE-2021-44228).
☆91Updated 2 months ago
Alternatives and similar repositories for Log4Pot:
Users that are interested in Log4Pot are comparing it to the libraries listed below
- Active C2 IoCs☆97Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆139Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Valhalla API Client☆67Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Website crawler with YARA detection☆88Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- ☆44Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- simple YARA-based IOC scanner☆166Updated last week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆147Updated last year
- YARA rule analyzer to improve rule quality and performance☆96Updated last month
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- ☆130Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- ☆41Updated 2 years ago
- ☆41Updated 10 months ago
- A Go implementation of JARM☆119Updated 2 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- IOC Collection 2022☆57Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆67Updated last month
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆98Updated last month
- HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆79Updated 7 months ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- Simulating Adversary Operations☆92Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆67Updated 3 months ago