Tools for attacking Azure Function Apps
☆88Oct 28, 2025Updated 3 months ago
Alternatives and similar repositories for FuncoPop
Users that are interested in FuncoPop are comparing it to the libraries listed below
Sorting:
- ☆65Jan 2, 2024Updated 2 years ago
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Python module for running BOFs☆79Nov 28, 2025Updated 2 months ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- PoC☆12Apr 7, 2025Updated 10 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- ☆79Aug 2, 2023Updated 2 years ago
- Python implementation of select MicroBurst scripts.☆14Aug 19, 2021Updated 4 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- string encryption in Nim☆20Jun 15, 2024Updated last year
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆190Feb 16, 2026Updated last week
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆233Jun 17, 2022Updated 3 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Azure DevOps Services Attack Toolkit☆314Mar 15, 2025Updated 11 months ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆487Updated this week
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆307Mar 15, 2025Updated 11 months ago
- ☆26Feb 11, 2025Updated last year
- ☆48Dec 21, 2025Updated 2 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆191Feb 5, 2023Updated 3 years ago
- Terminate AV/EDR leveraging BYOVD attack☆104Mar 21, 2025Updated 11 months ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- Updated o365 Evilginx phishlet for WHfB☆89Mar 16, 2024Updated last year
- ☆26Mar 6, 2025Updated 11 months ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- Tool to extract username and password of current user from PanGPA in plaintext☆89Dec 23, 2024Updated last year