Synzack / PynAuthLinks
☆40Updated 11 months ago
Alternatives and similar repositories for PynAuth
Users that are interested in PynAuth are comparing it to the libraries listed below
Sorting:
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- DEFCON 31 slide deck and video link☆65Updated 5 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆103Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆78Updated 2 months ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆121Updated 2 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆53Updated 7 months ago
- ☆105Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆78Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆159Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Baseline a Windows System against LOLBAS☆69Updated last year
- ☆97Updated this week
- https://lolad-project.github.io/☆82Updated 10 months ago
- Azure AD cheatsheet for the CARTP course☆137Updated 3 years ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆148Updated 3 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆135Updated 9 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆182Updated 11 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 9 months ago
- Ludus range for the Constructing Defense Lab☆64Updated last week
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆117Updated 2 months ago
- ☆92Updated 3 months ago
- ☆131Updated 4 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆45Updated 2 months ago