CCob / okta-terrify
Okta Verify and Okta FastPass Abuse Tool
☆289Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for okta-terrify
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆209Updated 2 months ago
- Halberd : Multi-Cloud Attack Tool☆216Updated this week
- Azure DevOps Services Attack Toolkit☆260Updated 3 months ago
- Retired TrustedSec Capabilities☆228Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆134Updated 3 months ago
- Azure mindmap for penetration tests☆171Updated last year
- Enumerate Microsoft Entra ID (Azure AD) fast☆87Updated 3 months ago
- ☆171Updated this week
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆232Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆174Updated 7 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆101Updated 7 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆163Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆221Updated 3 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆116Updated 3 months ago
- User Enumeration of Microsoft Teams users via API☆120Updated 7 months ago
- A Red Team Activity Hub☆177Updated this week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆244Updated 2 weeks ago
- ☆181Updated 2 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆182Updated 2 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆129Updated 2 months ago
- An open-source self-hosted purple team management web application.☆241Updated 3 months ago
- Ping-based Information Lookup and Outbound Transfer☆75Updated 7 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆172Updated 10 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- Canary Detection☆162Updated 7 months ago
- A Slack bot phishing framework for Red Teaming exercises☆159Updated 6 months ago
- BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfi…☆425Updated 2 months ago
- God Mode Detection Rules☆131Updated 3 months ago
- An ADCS honeypot to catch attackers in your internal network.☆226Updated 4 months ago