CIPP
log4shell-tool
CIPP | log4shell-tool | |
---|---|---|
39 | 4 | |
728 | 15 | |
- | - | |
9.8 | 0.0 | |
4 days ago | 10 months ago | |
JavaScript | ||
GNU Affero General Public License v3.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CIPP
-
Kasetto rips off CIPP - calls it influenced by
Well, if this is your license(https://github.com/KelvinTegelaar/CIPP/blob/main/LICENSE.md) - AGPL. There are enough fine folks https://www.eff.org/. That would be willing yo help you out. Could get Richard Stallman fired up
-
365 Management Tooms
u/steve7647 you should try all the products mentioned here, but if you want more info about CIPP check out https://cipp.app for some video highlights on how the application works and https://github.com/KelvinTegelaar/CIPP or our docs at https://docs.cipp.app.
- Microsoft: please stop spamming busy admins with "Let's take a tour!" popovers!
- Doing 365 admin from jumpboxes?
- How I debloat Windows
-
How do you pro MSPs deal with shared SaaS logins, local admins, password rotation, SSO for techs, etc?
Take a look at CIPP https://github.com/KelvinTegelaar/CIPP
- MSP Scripting Work
- Supervise multiple organizations' security score
- How are you standardising on new setups in Microsoft 365?
-
Org name not updating in MS admin center tenant switcher
That information is only picked up when you create the relationship with the client as PoR/DAP, I've made an edit function in CIPP, but if you are not using CIPP here's some instructions to do it by hand: https://github.com/KelvinTegelaar/CIPP/issues/71
log4shell-tool
- Lacerte Tax - Log4j
-
Evidence of a log4j attack found - Now what?
Start with confirming that an incident took place. My five-minute understanding of Datto's ComStore log4shell tool is that it does two things:
- Log4j PDQ scan profile
-
Automating with PowerShell: Detecting Log4j
For an in-depth explanation of what variables are required, please check the 'Usage' section of the readme viewable at https://github.com/datto/log4shell-tool. This explains the three variables that need to be set and what values to set them to.
What are some alternatives?
O365-Admin-Center - The O365 Admin Center is a GUI application that administrators can use to administer every aspect of Office 365 including Exchange Online, Compliance Center, SharePoint and Skype for Business.
Get-log4j-Windows.ps1 - Identifying all log4j components across all windows servers, entire domain, can be multi domain. CVE-2021-44228
dmarcts-report-viewer - DMARC Report Tool for use with rddmarc or dmarcts-report-parser (formerly imap-dmarcts)
incidentresponse
CIPP-API
PowerShellSnippets
Log4Shell-Automated - This is an automated script to scan for Log4J vulnerabilities. This is based off of the Datto script.
signature-base - YARA signature and IOC database for my scanners and tools
CVE-2021-44228-Log4Shell-Hashes - Hashes for vulnerable LOG4J versions
Debloat-Windows-10 - A Collection of Scripts Which Disable / Remove Windows 10 Features and Apps