Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical understanding.
☆25Dec 19, 2020Updated 5 years ago
Alternatives and similar repositories for SolarwindsVulnerablityInfo
Users that are interested in SolarwindsVulnerablityInfo are comparing it to the libraries listed below
Sorting:
- ☆100Dec 21, 2020Updated 5 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- Yubico OTP validation Slack bot☆10Oct 3, 2025Updated 4 months ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Sys Mon! Why yu nuh logging dat?☆12Dec 10, 2018Updated 7 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆16Jan 4, 2021Updated 5 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- ☆47Feb 12, 2026Updated 2 weeks ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Collect chrome extensions from various devices and find out if they are malicious☆24Jan 17, 2026Updated last month
- ☆562Jun 1, 2023Updated 2 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Historical Tracking of MAC Address Assignments☆41Updated this week
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆223May 1, 2021Updated 4 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Examine Chrome extensions for security issues☆95Nov 16, 2025Updated 3 months ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Good Stuff from Dark Web☆37Sep 3, 2024Updated last year
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- SunBurst DGA Decode Script☆205Jan 10, 2021Updated 5 years ago
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Updated this week
- A local scanner for vulnerable web applications☆41Feb 10, 2026Updated 2 weeks ago
- DInvisibleRegistry☆82Nov 20, 2020Updated 5 years ago
- a patched sshd for red team activities☆84Aug 8, 2021Updated 4 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago