FrankMcGovern / Hidden-Vendor-Security-AdvisoriesLinks
This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a paywall or a login experience.
☆32Updated last year
Alternatives and similar repositories for Hidden-Vendor-Security-Advisories
Users that are interested in Hidden-Vendor-Security-Advisories are comparing it to the libraries listed below
Sorting:
- ☆23Updated 8 months ago
- Hunt for SQLite files used by various applications☆26Updated 2 weeks ago
- ASR Configurator, Essentials and Atomic Testing☆99Updated 7 months ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- MS Graph Commands and Tools for Blue Teamers☆51Updated 2 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- DEFCON 31 slide deck and video link☆65Updated 5 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆111Updated 3 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- ☆52Updated 2 months ago
- Quick ESXi Log Parser☆28Updated last month
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated 2 years ago
- ☆43Updated 4 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 11 months ago
- General Content☆26Updated this week
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- Presentations from Conferences☆30Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆14Updated 5 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- ☆47Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 4 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆48Updated 8 months ago
- ☆41Updated 2 years ago
- ☆11Updated last year
- create a "simulated internet" cyber range environment☆19Updated 5 months ago
- ☆33Updated last year
- Azure AD Identity Protection Cookie Spoofing☆34Updated 2 years ago
- ESXi Cyber Security Incident Response Script☆25Updated last year