JeffJerseyCow / eviloauth
OAuth 2.0 exploitation, attack and research tools.
☆11Updated last year
Alternatives and similar repositories for eviloauth:
Users that are interested in eviloauth are comparing it to the libraries listed below
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆32Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Silver SAML forgery tool☆49Updated 11 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 9 months ago
- ☆20Updated 11 months ago
- 🌩️ Collection of BloodHound queries for Azure☆54Updated 3 weeks ago
- ☆52Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆19Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆74Updated 3 months ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 10 months ago
- tool for identifying guest relationships between companies☆84Updated 7 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆25Updated 3 weeks ago
- Custom queries list for BloodHound☆23Updated 5 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆26Updated 8 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆24Updated 4 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆43Updated last year
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆32Updated 3 months ago
- ☆27Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆27Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated 10 months ago
- A user enumeration tool for Slack.☆24Updated 7 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆51Updated 9 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆54Updated 3 months ago
- Enumerate and check domains for Azure tenants☆45Updated 3 years ago