FrankMcGovern / Hidden-Vendor-Security-AdvisoriesLinks
This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a paywall or a login experience.
☆32Updated last year
Alternatives and similar repositories for Hidden-Vendor-Security-Advisories
Users that are interested in Hidden-Vendor-Security-Advisories are comparing it to the libraries listed below
Sorting:
- ☆23Updated 9 months ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago
- ☆43Updated 4 years ago
- ASR Configurator, Essentials and Atomic Testing☆99Updated 7 months ago
- General Content☆25Updated 3 weeks ago
- Your Browser-based EVTX Companion☆89Updated this week
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- ☆52Updated 3 months ago
- Hunt for SQLite files used by various applications☆27Updated last month
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- DEFCON 31 slide deck and video link☆66Updated 6 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Source code and examples for Antignis☆44Updated 3 years ago
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last week
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- ☆53Updated last month
- Analyze Windows Firewall outbound blocks and selectively allow traffic☆69Updated 2 years ago
- Powershell Event Tracing Toolbox☆78Updated 3 years ago
- Quick ESXi Log Parser☆28Updated last month
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 2 months ago
- Evtx Log (xml) Browser☆55Updated 2 years ago
- Active Directory Group Policy analyzer☆18Updated 6 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆113Updated 3 months ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated 7 months ago