☆52Sep 1, 2025Updated 6 months ago
Alternatives and similar repositories for citrix-2025
Users that are interested in citrix-2025 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Apr 19, 2023Updated 2 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- Rusty Hell's Gate / Halo's Gate / Tartarus' Gate / FreshyCalls / Syswhispers2 Library☆33Sep 23, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fully automated Data Forensics / Recovery bot to recover, undelete, index, and organize as much as possible for any hard drive, and optio…☆13Feb 5, 2024Updated 2 years ago
- Evtx to Splunk ingestor☆16Mar 18, 2022Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 5 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last month
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆36Dec 18, 2025Updated 3 months ago
- This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of bes…☆13Apr 6, 2023Updated 2 years ago
- ☆19Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆43Jan 18, 2026Updated 2 months ago
- ☆12Aug 23, 2019Updated 6 years ago
- ☆22Mar 22, 2026Updated last week
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆80Jul 25, 2025Updated 8 months ago
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated last month
- ☆27May 6, 2024Updated last year
- ☆68Jan 16, 2025Updated last year
- A 1014 Byte ELF64/DOS.COM/GameBoy/Megadrive/PDF/ARJ/PKZIP/7zip Polyglot Binary☆13Sep 8, 2022Updated 3 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- Alerting engine (slack etc) for testssl.sh JSON result output files☆16Jul 10, 2019Updated 6 years ago
- 🏠 my dotfiles☆19Oct 18, 2024Updated last year
- 🐲 separate user on windows + firejail on linux + sandbox-exec on macOS☆21Feb 21, 2026Updated last month
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 3 years ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆394Apr 3, 2024Updated last year
- ☆19May 30, 2022Updated 3 years ago
- Extract Everything. Decompress entire folders filled with archives.☆24Mar 22, 2026Updated last week
- ☆17Mar 8, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repo contains the installation guide and EFI files required to get a perfectly functional macOS hackintosh on your Lenovo Thinkbook …☆14Jun 2, 2025Updated 9 months ago
- ☆13Oct 27, 2020Updated 5 years ago
- A list of resources to build a information security team.☆14Feb 10, 2021Updated 5 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Sun NFS 2.0 Release☆24Sep 16, 2025Updated 6 months ago
- ☆19May 1, 2025Updated 10 months ago
- ☆171Feb 27, 2026Updated last month