Tools for attacking Azure Function Apps
☆88Oct 28, 2025Updated 4 months ago
Alternatives and similar repositories for FuncoPop
Users that are interested in FuncoPop are comparing it to the libraries listed below
Sorting:
- ☆64Jan 2, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Python implementation of select MicroBurst scripts.☆14Aug 19, 2021Updated 4 years ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- ☆21Sep 23, 2025Updated 5 months ago
- PoC☆12Apr 7, 2025Updated 11 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆195Feb 16, 2026Updated last month
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆107Jun 27, 2024Updated last year
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆505Mar 4, 2026Updated 2 weeks ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆231Jun 17, 2022Updated 3 years ago
- Terminate AV/EDR leveraging BYOVD attack☆103Mar 21, 2025Updated 11 months ago
- ☆27Mar 6, 2025Updated last year
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆78Dec 7, 2025Updated 3 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- NetSPI HTTP Scrapers☆29Jul 9, 2019Updated 6 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Feb 5, 2023Updated 3 years ago
- ☆26Feb 11, 2025Updated last year
- ☆307Mar 15, 2025Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- ☆224Oct 22, 2023Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago