AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure DevOps. It leverages token-based authentication to uncover projects, repositories, pipelines, secrets, and user permissions helping identify misconfigurations and security gaps in DevOps environments.
☆26Oct 13, 2025Updated 5 months ago
Alternatives and similar repositories for AzDevRecon
Users that are interested in AzDevRecon are comparing it to the libraries listed below
Sorting:
- a small script to collect information from a management point☆37Jan 19, 2026Updated 2 months ago
- List web account manager (WAM) accounts added to the current profile☆24Dec 11, 2025Updated 3 months ago
- OAuth Device Code Phishing Toolkit☆114Feb 6, 2026Updated last month
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 8 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- ☆48Jun 6, 2025Updated 9 months ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Dec 5, 2025Updated 3 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 3 months ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆21Jan 8, 2026Updated 2 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆132Dec 8, 2025Updated 3 months ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Feb 23, 2026Updated 3 weeks ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38May 17, 2025Updated 10 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Repository for Ludus french templates☆23Mar 1, 2026Updated 2 weeks ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆168Jul 31, 2025Updated 7 months ago
- ☆20Mar 10, 2026Updated last week
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Jul 10, 2024Updated last year
- binary ninja cli for agents☆60Updated this week
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Mar 7, 2026Updated last week
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆79Jul 25, 2025Updated 7 months ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- Security tools for purple team, AI security, and M365/GWS. Authorized use only.☆66Mar 10, 2026Updated last week
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- Kerberos CNAME abuse PoC☆85Jan 27, 2026Updated last month
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 2 months ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆58Jul 31, 2024Updated last year
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆144Feb 14, 2026Updated last month
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago