Synzack / PynAuthLinks
☆41Updated last year
Alternatives and similar repositories for PynAuth
Users that are interested in PynAuth are comparing it to the libraries listed below
Sorting:
- DEFCON 31 slide deck and video link☆66Updated 6 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆78Updated 3 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- ☆105Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆81Updated 11 months ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆140Updated 11 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆63Updated 8 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆46Updated 3 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆62Updated 3 weeks ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆126Updated 3 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆162Updated last year
- ☆101Updated last month
- ☆74Updated last week
- https://lolad-project.github.io/☆84Updated 11 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- ☆182Updated last year
- ☆98Updated 4 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆35Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆150Updated 4 months ago
- ☆119Updated 4 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 3 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago