☆52Sep 1, 2025Updated 6 months ago
Alternatives and similar repositories for citrix-2025
Users that are interested in citrix-2025 are comparing it to the libraries listed below
Sorting:
- Tools for preservation of floppy disks☆15Nov 22, 2025Updated 3 months ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 10 months ago
- ☆27May 6, 2024Updated last year
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 4 months ago
- ☆117Jun 17, 2025Updated 8 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆36Dec 18, 2025Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆68Jan 16, 2025Updated last year
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆389Apr 3, 2024Updated last year
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- AD Live changes viewer☆36Feb 25, 2023Updated 3 years ago
- Chip'olino - hardware & software platform for research in the field "Power Attacks"☆54Aug 26, 2025Updated 6 months ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 6 months ago
- ☆44Feb 6, 2025Updated last year
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last month
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- ☆40Nov 29, 2024Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- ☆168Feb 27, 2026Updated last week
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- https://marslo.github.io/ibook/☆18Mar 3, 2026Updated last week
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Jun 22, 2025Updated 8 months ago
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- ☆10May 12, 2022Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week