CCob / okta-terrify
Okta Verify and Okta FastPass Abuse Tool
☆308Updated 6 months ago
Alternatives and similar repositories for okta-terrify:
Users that are interested in okta-terrify are comparing it to the libraries listed below
- ☆177Updated 4 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆238Updated last week
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆262Updated 2 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated last week
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆144Updated 3 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆184Updated last month
- Retired TrustedSec Capabilities☆246Updated 4 months ago
- A Red Team Activity Hub☆199Updated last week
- Azure DevOps Services Attack Toolkit☆287Updated 2 weeks ago
- Azure mindmap for penetration tests☆179Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆180Updated 11 months ago
- Halberd : Multi-Cloud Attack Platform☆256Updated 3 weeks ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆250Updated last year
- User Enumeration of Microsoft Teams users via API☆149Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆284Updated 9 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 10 months ago
- Ping-based Information Lookup and Outbound Transfer☆75Updated 11 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆168Updated 7 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆272Updated 7 months ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆91Updated 2 months ago
- ☆204Updated this week
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- Canary Detection☆163Updated 11 months ago
- ☆178Updated 3 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated 11 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆148Updated 5 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆47Updated 3 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆134Updated last month
- ☆141Updated 4 months ago