RobotOperator / EveLinks
Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.
☆38Updated 2 months ago
Alternatives and similar repositories for Eve
Users that are interested in Eve are comparing it to the libraries listed below
Sorting:
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆103Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆35Updated 3 months ago
- Addon for BHCE☆53Updated 7 months ago
- Hijack a slack bot to phish your way in☆57Updated 4 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆130Updated 2 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Claude MCP server to perform analysis on ROADrecon data☆47Updated 7 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 4 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆225Updated last month
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 8 months ago
- Protection against HTML smuggling attacks.☆99Updated 4 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Updated 5 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆68Updated 3 months ago
- ☆38Updated 3 weeks ago
- ☆78Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆90Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 8 months ago
- ☆119Updated 2 months ago
- Artifact monitoring that ensures fairplay☆78Updated 9 months ago
- Ludus range for the Constructing Defense Lab☆64Updated last week
- Repo hacks☆21Updated 6 months ago
- Covert data exfiltration via DNS☆50Updated 9 months ago
- Your Skyfall Infrastructure Pack☆87Updated 3 weeks ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆51Updated last month
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆150Updated 3 months ago
- Putting a leash on naughty AWS permissions☆132Updated 2 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated last year