SygniaLabs / QemunoLinks
Qemuno Framework
☆24Updated 3 years ago
Alternatives and similar repositories for Qemuno
Users that are interested in Qemuno are comparing it to the libraries listed below
Sorting:
- Artifact monitoring that ensures fairplay☆78Updated 8 months ago
- ☆59Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last month
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆91Updated last month
- ☆21Updated last week
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆78Updated 11 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated 11 months ago
- Silver SAML forgery tool☆56Updated last year
- ☆15Updated 3 years ago
- ☆46Updated last year
- ☆34Updated 4 years ago
- Repo hacks☆21Updated 5 months ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- fully async implementation of Dirkjan's ROADTools☆32Updated 6 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆61Updated 11 months ago
- ☆94Updated 2 years ago
- Tools for attacking Azure Function Apps☆83Updated 11 months ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- POC tool to abuse windows server failover clusters☆44Updated last month
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- blame Huy☆42Updated 4 years ago
- create a "simulated internet" cyber range environment☆18Updated 4 months ago
- ☆35Updated 4 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 2 months ago
- ☆28Updated 5 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated last year
- Bloodhound agent for Mythic☆21Updated 5 months ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago