CCob / okta-terrifyLinks
Okta Verify and Okta FastPass Abuse Tool
☆337Updated last year
Alternatives and similar repositories for okta-terrify
Users that are interested in okta-terrify are comparing it to the libraries listed below
Sorting:
- ☆189Updated last year
- A Red Team Activity Hub☆235Updated this week
- Azure DevOps Services Attack Toolkit☆305Updated 10 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 7 months ago
- Putting a leash on naughty AWS permissions☆132Updated 4 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆149Updated 7 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- Enumerate Microsoft Entra ID (Azure AD) fast☆99Updated 8 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 6 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆358Updated 11 months ago
- ☆116Updated last month
- User Enumeration of Microsoft Teams users via API☆184Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Ping-based Information Lookup and Outbound Transfer☆80Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆321Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Updated 11 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆349Updated 4 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆138Updated 2 months ago
- Retired TrustedSec Capabilities☆248Updated 2 weeks ago
- Azure mindmap for penetration tests☆194Updated 2 years ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆152Updated 3 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆275Updated 8 months ago
- ☆229Updated 7 months ago
- Canary Detection☆186Updated 3 months ago
- ☆117Updated 3 weeks ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆111Updated 4 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆228Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆335Updated last year