Keycloak security scanner
☆61Jul 6, 2024Updated last year
Alternatives and similar repositories for keycloak-scanner
Users that are interested in keycloak-scanner are comparing it to the libraries listed below
Sorting:
- Exposing Keycloak metrics endpoints for Prometheus!☆15Feb 16, 2026Updated 2 weeks ago
- Chrome extension to analyse oauth2 authentication process☆18Feb 28, 2020Updated 6 years ago
- Create an open source postman collection for the Keycloak REST API☆14Dec 28, 2022Updated 3 years ago
- Easy way how to add Quarkus extensions to your Keycloak deployment☆19Feb 4, 2026Updated last month
- HaveIBeenPwned Password Policy for Keycloak PoC☆12Jan 22, 2019Updated 7 years ago
- ☆14Jul 10, 2025Updated 7 months ago
- QSON is an object to JSON mapper☆35Jul 11, 2024Updated last year
- a small script to collect information from a management point☆37Jan 19, 2026Updated last month
- Modular C2 server to tame your pack of wolves☆22Feb 26, 2026Updated last week
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- A script to enumerate valid usernames based on the requests response times.☆22May 3, 2022Updated 3 years ago
- Custom Keycloak.X Server Distribution with selective features☆24Jan 30, 2023Updated 3 years ago
- HTTP+JSON Services using industry best Java libraries. Bases on Spring Boot, with Netflix OSS integration. Originally inspired by dropw…☆65May 27, 2014Updated 11 years ago
- Helps you understand and work through npm audit results☆20Dec 20, 2022Updated 3 years ago
- Open Policy Agent extension for Authzed SpiceDB☆24Oct 11, 2025Updated 4 months ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- A simple yet beautiful phishing proxy.☆58Aug 13, 2021Updated 4 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆26Feb 11, 2025Updated last year
- A collection of BBRF agents that can be deployed to AWS lambda☆24Nov 17, 2024Updated last year
- AI powered clipboard.☆52Oct 29, 2025Updated 4 months ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆127Mar 24, 2023Updated 2 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- wallhack for cs:go game☆11Jul 7, 2024Updated last year
- Launch your SOC as fast as a rocket with only one command☆12Feb 17, 2025Updated last year
- ☆10Apr 20, 2022Updated 3 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29May 7, 2017Updated 8 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Oct 9, 2021Updated 4 years ago
- ☆43Nov 15, 2025Updated 3 months ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Mar 7, 2021Updated 4 years ago
- Example full stack rust project using Sycamore for wasm and actix for backend, implementing BFF and OIDC for authentication.☆11Feb 4, 2023Updated 3 years ago
- ☆11Nov 22, 2021Updated 4 years ago
- ☆11May 17, 2023Updated 2 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- ☆14Jul 26, 2017Updated 8 years ago