Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.
☆42Sep 16, 2025Updated 6 months ago
Alternatives and similar repositories for Eve
Users that are interested in Eve are comparing it to the libraries listed below
Sorting:
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 6 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated this week
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆263Sep 23, 2025Updated 5 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Group Policy Objects manipulation and exploitation framework☆298Dec 7, 2025Updated 3 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 8 months ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Updated this week
- ☆18Apr 15, 2024Updated last year
- Enumerate active EDR's on the system☆152Sep 23, 2025Updated 5 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 4 months ago
- ☆43Dec 24, 2025Updated 2 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆402Aug 18, 2025Updated 7 months ago
- Web Application Firewall (WAF) Enhanced with AI through Autonomous Dynamic Learning and Generative Models☆16Feb 25, 2026Updated 3 weeks ago
- Security tool against dependency typosquatting attacks☆55Mar 14, 2026Updated last week
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 2 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated last month
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- ☆96Aug 3, 2025Updated 7 months ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- ☆163Nov 19, 2025Updated 4 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 5 months ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- Hunt Smarter, Hunt Harder☆144Updated this week
- Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams☆78Mar 13, 2026Updated last week
- General scripts that gather information out of Active Directory☆16Jun 9, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ☆23Mar 4, 2025Updated last year
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Feb 25, 2026Updated 3 weeks ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆144Feb 14, 2026Updated last month
- A wrapper for the TextBelt API that allows messages to be sent with delays from the command line.☆16May 19, 2015Updated 10 years ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago