Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Flask module for a better user experience. The primary focus of this tool is to have different attacking techniques all at one place with web UI interfa…
☆408Feb 21, 2025Updated last year
Alternatives and similar repositories for Vajra
Users that are interested in Vajra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆449Nov 2, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- Azure Security Resources and Notes☆1,717Feb 17, 2026Updated last month
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆458Mar 25, 2024Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,375Mar 9, 2026Updated 3 weeks ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- ☆64Jan 2, 2024Updated 2 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆370Jun 24, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- Azure JWT Token Manipulation Toolset☆722Dec 6, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆362Dec 13, 2025Updated 3 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆400Feb 9, 2026Updated last month
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆787Mar 19, 2026Updated last week
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,502Dec 21, 2023Updated 2 years ago
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 11 months ago
- BloodHound Attack Research Kit☆588Mar 18, 2025Updated last year
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,065Mar 20, 2026Updated last week
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆341Jun 6, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,692Jan 8, 2024Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆648Mar 20, 2024Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,117Jun 10, 2024Updated last year
- ☆102Oct 27, 2022Updated 3 years ago
- A C# utility for interacting with SCCM☆686Aug 20, 2025Updated 7 months ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Jan 27, 2024Updated 2 years ago
- XLL Phishing Tradecraft☆440May 24, 2022Updated 3 years ago