Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.
☆42Sep 16, 2025Updated 5 months ago
Alternatives and similar repositories for Eve
Users that are interested in Eve are comparing it to the libraries listed below
Sorting:
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 5 months ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- Web Application Firewall (WAF) Enhanced with AI through Autonomous Dynamic Learning and Generative Models☆14Updated this week
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Dec 20, 2025Updated 2 months ago
- Group Policy Objects manipulation and exploitation framework☆291Dec 7, 2025Updated 2 months ago
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- ☆41Dec 24, 2025Updated 2 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- General scripts that gather information out of Active Directory☆16Jun 9, 2022Updated 3 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- ☆18Apr 15, 2024Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆121Jan 30, 2026Updated last month
- A repository dedicated to sharing Indicators of Compromise (IOCs) from production systems experiencing security incidents and OSINT feeds…☆43Updated this week
- ☆96Aug 3, 2025Updated 6 months ago
- Security tool against dependency typosquatting attacks☆54Updated this week
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆124Feb 14, 2026Updated 2 weeks ago
- ☆23Mar 4, 2025Updated 11 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 7 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109May 30, 2025Updated 9 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆391Aug 18, 2025Updated 6 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- ☆163Nov 19, 2025Updated 3 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated 3 weeks ago
- NOVA: The Prompt Pattern Matching☆98Jan 27, 2026Updated last month
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆44Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- Random source codes☆26Dec 22, 2025Updated 2 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆142Nov 14, 2025Updated 3 months ago
- ☆43Jul 17, 2025Updated 7 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆72Updated this week
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- ☆55Nov 4, 2025Updated 3 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆33Jun 3, 2025Updated 8 months ago
- ☆42Nov 13, 2025Updated 3 months ago