.. |
web_apache_segfault.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_apache_threading_error.yml
|
Added UUIDs to rules
|
2019-11-12 23:12:27 +01:00 |
web_citrix_cve_2019_19781_exploit.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_citrix_cve_2020_8193_8195_exploit.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_cve_2018_2894_weblogic_exploit.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_cve_2019_3398_confluence.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_cve_2020_0688_msexchange.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_cve_2020_3452_cisco_asa_ftd.yml
|
Cisco ASA FTD Exploit CVE-2020-3452
|
2021-01-07 13:17:58 +01:00 |
web_cve_2020_5902_f5_bigip.yml
|
rule: extended F5 BIG-IP exploitation detection rule
|
2020-07-07 21:45:08 +02:00 |
web_cve_2020_14882_weblogic_exploit.yml
|
rule: added second expression
|
2020-11-04 16:43:35 +01:00 |
web_cve_2021_2109_weblogic_rce_exploit.yml
|
Added rule for Oracle WebLogic Exploit CVE-2021-2109
|
2021-01-20 14:28:18 +05:45 |
web_cve_2021_21978_vmware_view_planner_exploit.yml
|
Added rule for CVE-2021-21978 in VMware View Planner
|
2021-03-10 18:05:15 +05:45 |
web_cve_2021_22893_pulse_secure_rce_exploit.yml
|
Update web_cve_2021_22893_pulse_secure_rce_exploit.yml
|
2021-07-01 09:49:01 +02:00 |
web_cve_2021_26814_wzuh_rce.yml
|
Create web_cve_2021_26814_wzuh_rce.yml
|
2021-05-22 15:45:38 +02:00 |
web_exchange_cve_2020_0688_exploit.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_exchange_exploitation_hafnium.yml
|
fix: description
|
2021-03-04 17:35:25 +01:00 |
web_expl_exchange_cve_2021_28480.yml
|
rule: exchange vulnerability CVE-2021-28480
|
2021-05-14 10:08:41 +02:00 |
web_fortinet_cve_2018_13379_preauth_read_exploit.yml
|
Removed a value
|
2020-12-08 10:38:32 +01:00 |
web_multiple_suspicious_resp_codes_single_source.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_nginx_core_dump.yml
|
Update web_nginx_core_dump.yml
|
2021-07-03 10:39:37 +08:00 |
web_pulsesecure_cve-2019-11510.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_solarwinds_cve_2020_10148.yml
|
Fixed typo in file format
|
2020-12-28 11:46:02 +05:45 |
web_solarwinds_supernova_webshell.yml
|
rule: improved solarwinds webshell rule
|
2020-12-22 10:36:34 +01:00 |
web_sonicwall_jarrewrite_exploit.yml
|
rule: SonicWall exploitation
|
2021-01-25 11:54:23 +01:00 |
web_source_code_enumeration.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
web_terramaster_cve_2020_28188_rce_exploit.yml
|
Fixed c-uri
|
2021-02-02 10:23:47 +05:45 |
web_unc2546_dewmode_php_webshell.yml
|
rule: simplified rule
|
2021-02-22 17:19:14 +01:00 |
web_vsphere_cve_2021_21972_unauth_rce_exploit.yml
|
Update web_vsphere_cve_2021_21972_unauth_rce_exploit.yml
|
2021-03-03 09:08:24 +01:00 |
web_webshell_keyword.yml
|
Second round
|
2020-09-15 07:02:30 -06:00 |
win_powershell_snapins_hafnium.yml
|
Detect HAFNIUM operations
|
2021-03-04 00:01:54 +07:00 |
win_webshell_regeorg.yml
|
Clean up: Webshell ReGeorg Detection
|
2021-04-05 13:01:10 -04:00 |