JeffJerseyCow / eviloauthLinks
OAuth 2.0 exploitation, attack and research tools.
☆12Updated last year
Alternatives and similar repositories for eviloauth
Users that are interested in eviloauth are comparing it to the libraries listed below
Sorting:
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆39Updated 2 weeks ago
- Tools used for Pentesting☆22Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆36Updated this week
- ☆27Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆55Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated last month
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated 7 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆46Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 2 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated last year
- ☆32Updated 2 years ago
- ☆35Updated 3 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Some Cheat Sheet for Red Team☆16Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated last year
- Additional active scan checks for BURP☆27Updated 8 months ago
- Scripts that automate portions of pentests.☆51Updated last month
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 3 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆32Updated this week
- Enumerate and check domains for Azure tenants☆58Updated 3 years ago
- ☆24Updated 6 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆52Updated 2 years ago
- ☆21Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 5 months ago