jkerai1 / TLD-TABL-BlockView external linksLinks
Block abused TLDs in Tenant Allow BlockList
☆14Jan 21, 2026Updated 3 weeks ago
Alternatives and similar repositories for TLD-TABL-Block
Users that are interested in TLD-TABL-Block are comparing it to the libraries listed below
Sorting:
- PowerShell Module to find compatible FIDO2 keys for Entra☆18Updated this week
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated 10 months ago
- PowerShell-based Automation of Defender for Endpoint☆184Jul 3, 2025Updated 7 months ago
- Repository for Software Certs for easy software blocking across corp environments, for example, using MDE IOC☆64Feb 7, 2026Updated last week
- some KQL Queries for Advanced Hunting☆58Updated this week
- Stop Microsoft 365 configuration drift before it becomes a breach☆49Updated this week
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆10Nov 25, 2025Updated 2 months ago
- Community project to classify, identify and protect your privileges based on Enterprise Access Model (EAM)☆202Feb 7, 2026Updated last week
- ☆46Apr 28, 2025Updated 9 months ago
- Random Scripts for Sharing☆12Jun 2, 2020Updated 5 years ago
- A bot that uses various APIs to scan links directly inside any discord server automatically☆14Jun 10, 2025Updated 8 months ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆33Sep 22, 2025Updated 4 months ago
- ☆11Mar 29, 2022Updated 3 years ago
- ☆16Aug 25, 2025Updated 5 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- ☆11Nov 18, 2025Updated 2 months ago
- Tools by cooey comrades for cooey comrades.☆16Feb 23, 2023Updated 2 years ago
- Root a Toon 1 or Toon 2 using a USB stick, not a Raspberry Pi (based on solution by Igor Ybema)☆19Sep 30, 2022Updated 3 years ago
- ☆11Aug 15, 2024Updated last year
- ☆16Oct 31, 2025Updated 3 months ago
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated 11 months ago
- ☆17Jul 24, 2025Updated 6 months ago
- ☆24Sep 12, 2025Updated 5 months ago
- PowerShell module with commands for working with Azure AD Privileged Identity Management☆13Aug 6, 2025Updated 6 months ago
- Calculator, for Programmers!☆11Oct 8, 2025Updated 4 months ago
- Pentest report writing guide☆18Sep 24, 2023Updated 2 years ago
- Republic of Korea (South Korea) specific OSINT source list☆16Mar 2, 2022Updated 3 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- Reworked assets for Azure Sentinel using Cisco Umbrella logs as source. Includes logstash config for Cisco Umbrella using Cisco managed A…☆13Apr 14, 2020Updated 5 years ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Power BI templates for Exchange Online Protection and Office 365 Advanced Threat Protection reporting☆13Sep 9, 2020Updated 5 years ago
- This module is used to deploy subnet with network security group and route table associated as workaround to the azurerm_subnet resource …☆12Jan 25, 2026Updated 3 weeks ago
- Remove all resources from an Azure Tenant and it's Subscriptions.☆55Feb 3, 2026Updated last week
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- A mine sweeper implementation for the flipper zero.☆13Mar 4, 2025Updated 11 months ago
- Defender XDR Advanced Hunting Queries (MDE, MDAV, Device Discovery)☆12Jan 22, 2026Updated 3 weeks ago