SygniaLabs / QemunoLinks
Qemuno Framework
☆24Updated 3 years ago
Alternatives and similar repositories for Qemuno
Users that are interested in Qemuno are comparing it to the libraries listed below
Sorting:
- ☆59Updated 2 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆86Updated last week
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last month
- ☆21Updated 2 weeks ago
- ☆46Updated last year
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- tool for identifying guest relationships between companies☆101Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- ☆103Updated 2 years ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆71Updated 5 months ago
- ☆15Updated 3 years ago
- Repo hacks☆20Updated 4 months ago
- ☆54Updated last year
- Tools for attacking Azure Function Apps☆83Updated 10 months ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 5 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- blame Huy☆42Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated 10 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated last month
- ☆69Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated last month
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated last year
- Silver SAML forgery tool☆55Updated last year
- create a "simulated internet" cyber range environment☆18Updated 3 months ago
- ☆35Updated 3 months ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- Claude MCP server to perform analysis on ROADrecon data☆45Updated 5 months ago
- POC tool to abuse windows server failover clusters☆43Updated last month