RobotOperator / EveLinks
Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.
☆37Updated last month
Alternatives and similar repositories for Eve
Users that are interested in Eve are comparing it to the libraries listed below
Sorting:
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆99Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆35Updated 2 months ago
- Addon for BHCE☆53Updated 6 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆122Updated last month
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 6 months ago
- Hijack a slack bot to phish your way in☆57Updated 3 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆78Updated last week
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 3 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆197Updated last week
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 7 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆59Updated last year
- ☆35Updated last week
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Updated 4 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- Living off the land searches for explorer and sharepoint☆90Updated 6 months ago
- Artifact monitoring that ensures fairplay☆78Updated 8 months ago
- Repo hacks☆21Updated 6 months ago
- ☆73Updated 2 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 7 months ago
- ☆55Updated 4 months ago
- Your Skyfall Infrastructure Pack☆77Updated last week
- Simple C2 using GitHub repository as comms channel.☆31Updated last year
- Protection against HTML smuggling attacks.☆99Updated 3 months ago
- Putting a leash on naughty AWS permissions☆130Updated last month
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆74Updated 6 months ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆51Updated last month
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆68Updated 2 months ago
- A simple POC to expose Mythic as a MCP server☆69Updated 7 months ago