SikretaLabs / BlueMapLinks
A Azure Exploitation Toolkit for Red Team & Pentesters
☆165Updated 2 years ago
Alternatives and similar repositories for BlueMap
Users that are interested in BlueMap are comparing it to the libraries listed below
Sorting:
- ☆178Updated 6 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- Azure AD cheatsheet for the CARTP course☆119Updated 3 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆164Updated 8 months ago
- ☆99Updated 3 years ago
- https://lolad-project.github.io/☆77Updated 5 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆149Updated 6 months ago
- Azure mindmap for penetration tests☆185Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 3 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆176Updated 9 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆102Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- ☆183Updated last week
- Azure DevOps Services Attack Toolkit☆143Updated 3 months ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆92Updated 2 months ago
- User Enumeration of Microsoft Teams users via API☆159Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆112Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Updated last year
- ☆169Updated 2 months ago
- a map for the azure oriented pentests☆67Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆256Updated 3 years ago
- Automated exploitation of MSSQL servers at scale☆108Updated this week
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- ☆110Updated 4 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆129Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆153Updated 2 years ago
- ☆108Updated 2 years ago