Block abused TLDs in Tenant Allow BlockList
☆15Jan 21, 2026Updated last month
Alternatives and similar repositories for TLD-TABL-Block
Users that are interested in TLD-TABL-Block are comparing it to the libraries listed below
Sorting:
- PowerShell Module to find compatible FIDO2 keys for Entra☆18Updated this week
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated 11 months ago
- PowerShell-based Automation of Defender for Endpoint☆187Jul 3, 2025Updated 8 months ago
- Repository for Software Certs for easy software blocking across corp environments, for example, using MDE IOC☆66Updated this week
- some KQL Queries for Advanced Hunting☆69Updated this week
- Community project to classify, identify and protect your privileges based on Enterprise Access Model (EAM)☆210Mar 1, 2026Updated last week
- ☆47Apr 28, 2025Updated 10 months ago
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated 11 months ago
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆12Nov 25, 2025Updated 3 months ago
- A bot that uses various APIs to scan links directly inside any discord server automatically☆14Jun 10, 2025Updated 8 months ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆35Sep 22, 2025Updated 5 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- Random Scripts for Sharing☆12Jun 2, 2020Updated 5 years ago
- Tools by cooey comrades for cooey comrades.☆16Feb 23, 2023Updated 3 years ago
- ☆16Oct 31, 2025Updated 4 months ago
- Root a Toon 1 or Toon 2 using a USB stick, not a Raspberry Pi (based on solution by Igor Ybema)☆21Sep 30, 2022Updated 3 years ago
- ☆11Nov 18, 2025Updated 3 months ago
- ☆11Aug 15, 2024Updated last year
- ☆11Mar 29, 2022Updated 3 years ago
- PowerShell module with commands for working with Azure AD Privileged Identity Management☆13Aug 6, 2025Updated 7 months ago
- Power BI templates for Exchange Online Protection and Office 365 Advanced Threat Protection reporting☆13Sep 9, 2020Updated 5 years ago
- ☆17Jul 24, 2025Updated 7 months ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- Reworked assets for Azure Sentinel using Cisco Umbrella logs as source. Includes logstash config for Cisco Umbrella using Cisco managed A…☆13Apr 14, 2020Updated 5 years ago
- Harness the security superpowers of your cloud asset inventory