TROUBLE-1 / AzDevReconLinks
AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure DevOps. It leverages token-based authentication to uncover projects, repositories, pipelines, secrets, and user permissions helping identify misconfigurations and security gaps in DevOps environments.
☆25Updated 3 months ago
Alternatives and similar repositories for AzDevRecon
Users that are interested in AzDevRecon are comparing it to the libraries listed below
Sorting:
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- ☆14Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Nemesis agent for Mythic☆28Updated last month
- Docker container for running CobaltStrike 4.7 and above☆24Updated 10 months ago
- ☆27Updated 4 years ago
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 10 months ago
- ☆42Updated 8 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Updated 11 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Updated 10 months ago
- ☆14Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- ☆15Updated 2 years ago
- ☆21Updated 4 months ago
- Linux CS bypass technique☆32Updated last year
- SMB Audit Tool you were looking for☆24Updated 2 years ago
- ☆70Updated 2 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Updated last month
- Your Skyfall Infrastructure Pack☆90Updated last week
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Validates priv escalation of AD trusts☆48Updated 10 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago
- Find Inbound Email Domains☆35Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 10 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Updated 6 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Updated 6 months ago
- ☆18Updated 8 months ago
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago