Enumeration and reconnaissance activities in the Microsoft Azure Cloud.
☆254Feb 20, 2019Updated 7 years ago
Alternatives and similar repositories for Azurite
Users that are interested in Azurite are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security auditing tool for Azure environments☆583Nov 4, 2022Updated 3 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,374Mar 15, 2026Updated last month
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Chameleon: A tool for evading Proxy categorisation☆514Nov 28, 2024Updated last year
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,656Oct 11, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,566Oct 17, 2022Updated 3 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆141Aug 31, 2021Updated 4 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆251Nov 24, 2015Updated 10 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,116Apr 26, 2020Updated 6 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Feb 23, 2022Updated 4 years ago
- The iOS Security Testing Framework☆1,387Oct 25, 2020Updated 5 years ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆910Dec 17, 2024Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,227Aug 7, 2025Updated 8 months ago
- Exploits written by the Rhino Security Labs team☆1,100Jan 23, 2021Updated 5 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆575Dec 9, 2017Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- retrieve information via O365 and AzureAD with a valid cred☆740Aug 14, 2022Updated 3 years ago
- PowerShell Pass The Hash Utils☆1,753Dec 9, 2018Updated 7 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Burp Suite extension to perform Kerberos authentication☆106Jun 28, 2024Updated last year
- PowerShell Scripts I find useful☆777May 18, 2016Updated 9 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆528Apr 14, 2023Updated 3 years ago