JeffJerseyCow / eviloauth
OAuth 2.0 exploitation, attack and research tools.
☆10Updated 8 months ago
Related projects: ⓘ
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆37Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆29Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆34Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated 10 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆15Updated 3 weeks ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆27Updated last year
- ☆20Updated 7 months ago
- Custom queries list for BloodHound☆18Updated 3 weeks ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆49Updated 5 months ago
- ☆26Updated 2 years ago
- Enumerate AWS permissions and resources.☆62Updated 2 years ago
- Parses Snaffler output file and generate beautified outputs.☆29Updated last month
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆42Updated 10 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆49Updated last year
- ☆34Updated 6 months ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 2 years ago
- tool for identifying guest relationships between companies☆83Updated 2 months ago
- ☆31Updated this week
- Dump Kerberos tickets from the KCM database of SSSD☆30Updated last week
- ☆14Updated last year
- ☆50Updated 11 months ago
- ysoserial.net docker image☆27Updated 7 months ago
- User enumeration and password spraying tool for testing Azure AD☆67Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆19Updated 3 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆20Updated 3 years ago
- Some Cheat Sheet for Red Team☆15Updated last year
- create a "simulated internet" cyber range environment☆11Updated 2 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆30Updated 10 months ago