NCSC-NL / citrix-2025View external linksLinks
☆51Sep 1, 2025Updated 5 months ago
Alternatives and similar repositories for citrix-2025
Users that are interested in citrix-2025 are comparing it to the libraries listed below
Sorting:
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- ☆26May 6, 2024Updated last year
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 3 months ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆34Dec 18, 2025Updated last month
- ☆116Jun 17, 2025Updated 7 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆133Jul 22, 2025Updated 6 months ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- ☆68Jan 16, 2025Updated last year
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆389Apr 3, 2024Updated last year
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- AD Live changes viewer☆36Feb 25, 2023Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Chip'olino - hardware & software platform for research in the field "Power Attacks"☆53Aug 26, 2025Updated 5 months ago
- ☆44Feb 6, 2025Updated last year
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 5 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- ☆41Nov 29, 2024Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- ☆166Jun 20, 2025Updated 7 months ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago
- ☆11Apr 25, 2021Updated 4 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- ☆22Nov 22, 2025Updated 2 months ago
- ☆45Dec 2, 2025Updated 2 months ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- ☆10May 12, 2022Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 7 months ago