CCob / okta-terrifyLinks
Okta Verify and Okta FastPass Abuse Tool
☆337Updated last year
Alternatives and similar repositories for okta-terrify
Users that are interested in okta-terrify are comparing it to the libraries listed below
Sorting:
- ☆188Updated last year
- Enumerate Microsoft Entra ID (Azure AD) fast☆99Updated 7 months ago
- A Red Team Activity Hub☆233Updated last month
- Azure DevOps Services Attack Toolkit☆305Updated 8 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆332Updated 10 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆162Updated last year
- ☆116Updated this week
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Updated 6 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆336Updated 3 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Updated 4 months ago
- Ping-based Information Lookup and Outbound Transfer☆80Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 4 months ago
- Canary Detection☆188Updated last month
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆147Updated 4 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆137Updated 10 months ago
- User Enumeration of Microsoft Teams users via API☆177Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆274Updated 6 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆135Updated 3 weeks ago
- Azure mindmap for penetration tests☆193Updated 2 years ago
- An ADCS honeypot to catch attackers in your internal network.☆318Updated last year
- Cloud subdomains identification tool☆61Updated 7 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- Retired TrustedSec Capabilities☆248Updated last year
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 6 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆197Updated last year
- ☆40Updated last year
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆354Updated 3 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆165Updated last year