pr0xylife / pr0xylifeView external linksLinks
Config files for my GitHub profile.
☆14May 7, 2023Updated 2 years ago
Alternatives and similar repositories for pr0xylife
Users that are interested in pr0xylife are comparing it to the libraries listed below
Sorting:
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆46Jun 28, 2025Updated 7 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆33Aug 26, 2022Updated 3 years ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- MISP to Microsoft Defender integration☆16Feb 6, 2026Updated last week
- https://github.com/Swiftonsecurity/sysmon-config☆10Nov 8, 2018Updated 7 years ago
- EMR Advisor uses Spark Event Logs to generate insights and costs/runtime recommendations using different deployment options for Amazon EM…☆17Jun 5, 2025Updated 8 months ago
- ☆12Aug 16, 2024Updated last year
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Generate Ghidra class structures☆12Jan 3, 2020Updated 6 years ago
- ☆13Sep 10, 2025Updated 5 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- ☆11May 2, 2022Updated 3 years ago
- ☆14Aug 22, 2025Updated 5 months ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Dec 4, 2024Updated last year
- ☆59Oct 17, 2024Updated last year
- A Cybersecurity Generalist LLM (ICLR'26)☆27Feb 9, 2026Updated last week
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 3 months ago
- ☆22Aug 16, 2025Updated 6 months ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- Reflex SOAR☆12Apr 1, 2022Updated 3 years ago
- GitHub landing page repo☆12Mar 21, 2025Updated 10 months ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆40Updated this week
- Enhanced version of binaryninja-ollama and without using the ollama Python library☆13Jan 23, 2025Updated last year
- Open-source pedestal frame design files for cockpit build.☆33Updated this week
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆61Jul 27, 2025Updated 6 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Host Internal Static Website on AWS☆17Dec 6, 2023Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- HackAgent is an open-source security toolkit to detect vulnerabilities of your AI Agents☆36Updated this week
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year