Config files for my GitHub profile.
β14May 7, 2023Updated 2 years ago
Alternatives and similar repositories for pr0xylife
Users that are interested in pr0xylife are comparing it to the libraries listed below
Sorting:
- Extension functionality for the NightHawk operator clientβ26Oct 31, 2023Updated 2 years ago
- π‘οΈ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE ATβ¦β45Jun 28, 2025Updated 8 months ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Reportβ28Oct 10, 2023Updated 2 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to theirβ¦β29Nov 20, 2024Updated last year
- A massive collection of Cybersecurity papers, guides and reports.β10Jan 3, 2025Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.β34Aug 26, 2022Updated 3 years ago
- Folder Or File Delete to Get System Shell on Current Session Desktopβ47Jan 14, 2025Updated last year
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows β¦β15Jun 8, 2023Updated 2 years ago
- A simple DNS exfiltration scriptβ11Apr 17, 2023Updated 2 years ago
- MISP to Microsoft Defender integrationβ17Feb 24, 2026Updated last week
- TG 2016 hacking compo repoβ10Mar 31, 2016Updated 9 years ago
- Build wordlists from the common-crawl indexβ12Oct 9, 2022Updated 3 years ago
- https://github.com/Swiftonsecurity/sysmon-configβ10Nov 8, 2018Updated 7 years ago
- β12Aug 16, 2024Updated last year
- β13Sep 10, 2025Updated 6 months ago
- Extensible MacOS system telemetry generator.β53Mar 1, 2026Updated last week
- β11May 2, 2022Updated 3 years ago
- Generate Ghidra class structuresβ12Jan 3, 2020Updated 6 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark webβ11Sep 21, 2022Updated 3 years ago
- repository containing some nmap scriptsβ16Jan 15, 2021Updated 5 years ago
- EMR Advisor uses Spark Event Logs to generate insights and costs/runtime recommendations using different deployment options for Amazon EMβ¦β17Jun 5, 2025Updated 9 months ago
- ShellSweeping the evil.β53Jun 18, 2024Updated last year
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needsβ48Dec 4, 2024Updated last year
- Full of public notes and Utilitiesβ131Jan 6, 2026Updated 2 months ago
- Hundred Days of Yara Challengeβ12Jun 21, 2022Updated 3 years ago
- Open-source pedestal frame design files for cockpit build.β35Feb 11, 2026Updated 3 weeks ago
- Reflex SOARβ12Apr 1, 2022Updated 3 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating systemβ13Jun 24, 2022Updated 3 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β130Apr 6, 2024Updated last year
- β22Aug 16, 2025Updated 6 months ago
- Menu for Thor scanner liteβ20Oct 24, 2025Updated 4 months ago
- A Cybersecurity Generalist LLM (ICLR'26)β33Feb 9, 2026Updated last month
- GitHub landing page repoβ12Feb 18, 2026Updated 2 weeks ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azureβ14Jun 27, 2023Updated 2 years ago
- Enhanced version of binaryninja-ollama and without using the ollama Python libraryβ13Jan 23, 2025Updated last year
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micrβ¦β62Jul 27, 2025Updated 7 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirementsβ127Dec 5, 2023Updated 2 years ago
- Random tips and tricks RE: ransomwareβ14Aug 17, 2021Updated 4 years ago
- Cloud threat detection visualization from excalidrawβ12Apr 25, 2022Updated 3 years ago