Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
☆528Nov 18, 2022Updated 3 years ago
Alternatives and similar repositories for OpenSSL-2022
Users that are interested in OpenSSL-2022 are comparing it to the libraries listed below
Sorting:
- ☆170Nov 1, 2022Updated 3 years ago
- ☆44Jul 11, 2025Updated 8 months ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,741Oct 20, 2023Updated 2 years ago
- ☆124Sep 20, 2022Updated 3 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,889Jun 15, 2022Updated 3 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- ☆569Dec 7, 2022Updated 3 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- Tools for hunting for threats.☆599Apr 30, 2025Updated 10 months ago
- ☆2,078Dec 13, 2021Updated 4 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- ☆104Oct 24, 2022Updated 3 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆818Mar 6, 2026Updated 2 weeks ago
- ☆512Oct 7, 2024Updated last year
- ☆96May 5, 2025Updated 10 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆258Mar 2, 2026Updated 2 weeks ago
- Website for ail-typo-squatting library☆72Feb 25, 2026Updated 3 weeks ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆102Aug 15, 2025Updated 7 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Documentation and scripts to properly enable Windows event logs.☆673Oct 3, 2025Updated 5 months ago
- CVE-2022-41852 Proof of Concept (unofficial)☆75Oct 20, 2022Updated 3 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Mar 9, 2026Updated last week
- A VBA parser and emulation engine to analyze malicious macros.☆97Mar 4, 2026Updated 2 weeks ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,488Feb 16, 2026Updated last month
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,062Feb 24, 2026Updated 3 weeks ago
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆8,545Updated this week
- it is very good☆515Dec 20, 2022Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,476Mar 2, 2026Updated 2 weeks ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,077Dec 11, 2024Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,434Nov 23, 2022Updated 3 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,083Feb 1, 2024Updated 2 years ago
- ☆225Sep 8, 2022Updated 3 years ago
- IntelMQ Tutorial and Introductory Documentation☆15May 26, 2022Updated 3 years ago