xsultan / log4jshieldLinks
Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher
☆13Updated 4 years ago
Alternatives and similar repositories for log4jshield
Users that are interested in log4jshield are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆52Updated 2 years ago
- ☆41Updated 4 years ago
- ☆36Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- ☆15Updated 4 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Security checks for your researches☆34Updated 5 years ago
- ☆30Updated 3 weeks ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- Follow all members of a list☆12Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Updated 2 years ago
- Pull secrets from an AWS environment☆67Updated 6 years ago
- Collection of Slides From My Conference Talks☆20Updated 3 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- ☆60Updated 2 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Updated 5 years ago
- Windows Security Logging☆43Updated 3 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆35Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 4 years ago
- ☆71Updated 2 weeks ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago