Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Flask module for a better user experience. The primary focus of this tool is to have different attacking techniques all at one place with web UI interfa…
☆407Feb 21, 2025Updated last year
Alternatives and similar repositories for Vajra
Users that are interested in Vajra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆450Nov 2, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- Azure Security Resources and Notes☆1,734Feb 17, 2026Updated 2 months ago
- Azure DevOps Services Attack Toolkit☆314Mar 15, 2025Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A tool for pointesters to find candies in SharePoint☆282Nov 4, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆383Apr 16, 2022Updated 4 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆459Mar 25, 2024Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,378Mar 9, 2026Updated last month
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- ☆64Jan 2, 2024Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆370Jun 24, 2025Updated 9 months ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆817Oct 27, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 7 months ago
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆412Apr 12, 2026Updated last week
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆799Apr 2, 2026Updated 2 weeks ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆484Oct 14, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- BloodHound Attack Research Kit☆590Mar 18, 2025Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 11 months ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,073Mar 20, 2026Updated 3 weeks ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆341Jun 6, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,698Jan 8, 2024Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,129Jun 10, 2024Updated last year
- ☆102Oct 27, 2022Updated 3 years ago
- A C# utility for interacting with SCCM☆686Mar 30, 2026Updated 2 weeks ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Jan 27, 2024Updated 2 years ago
- XLL Phishing Tradecraft☆440May 24, 2022Updated 3 years ago