CCob / okta-terrifyLinks
Okta Verify and Okta FastPass Abuse Tool
☆330Updated 11 months ago
Alternatives and similar repositories for okta-terrify
Users that are interested in okta-terrify are comparing it to the libraries listed below
Sorting:
- Azure DevOps Services Attack Toolkit☆300Updated 5 months ago
- ☆185Updated 9 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 2 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆224Updated last week
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆315Updated 7 months ago
- A Red Team Activity Hub☆222Updated 2 weeks ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 8 months ago
- Canary Detection☆187Updated 3 months ago
- Azure mindmap for penetration tests☆187Updated last year
- Enumerate Microsoft Entra ID (Azure AD) fast☆93Updated 4 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆273Updated last month
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆103Updated last month
- Putting a leash on naughty AWS permissions☆128Updated 4 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆258Updated 3 months ago
- An ADCS honeypot to catch attackers in your internal network.☆309Updated last year
- User Enumeration of Microsoft Teams users via API☆163Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆133Updated 6 months ago
- ☆104Updated last month
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆244Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆144Updated 3 weeks ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆123Updated last month
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 2 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- https://lolad-project.github.io/☆80Updated 7 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆185Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆205Updated 4 months ago
- ☆206Updated 2 months ago