xaitax / cisa-catalog-known-vulnerabilities
☆20Updated last month
Alternatives and similar repositories for cisa-catalog-known-vulnerabilities:
Users that are interested in cisa-catalog-known-vulnerabilities are comparing it to the libraries listed below
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- ☆77Updated 11 months ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆91Updated 2 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated last year
- DEFCON 31 slide deck and video link☆58Updated 9 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆76Updated 5 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 6 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆46Updated last year
- ☆34Updated last year
- Tools for attacking Azure Function Apps☆69Updated 5 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated 3 weeks ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 3 months ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆45Updated 3 weeks ago
- Silver SAML forgery tool☆49Updated last year
- Living Off Security Tools☆45Updated 5 months ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 10 months ago
- ☆53Updated 7 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated 11 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆42Updated 2 years ago
- ☆32Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Examine Chrome extensions for security issues☆81Updated 3 weeks ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- ☆40Updated 7 months ago