Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an intuitive web-based user interface built with the Python Flask module for a better user experience. The primary focus of this tool is to have different attacking techniques all at one place with web UI interfa…
☆408Feb 21, 2025Updated last year
Alternatives and similar repositories for Vajra
Users that are interested in Vajra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆451Nov 2, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- Azure Security Resources and Notes☆1,741Feb 17, 2026Updated 2 months ago
- Azure DevOps Services Attack Toolkit☆315Mar 15, 2025Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,386Oct 27, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool for pointesters to find candies in SharePoint☆284Nov 4, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 4 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆462Mar 25, 2024Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,387Mar 9, 2026Updated 2 months ago
- Ask a TGS on behalf of another user without password☆483Mar 30, 2025Updated last year
- ☆63Jan 2, 2024Updated 2 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆372Jun 24, 2025Updated 10 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Enumerate Domain Data☆334Sep 13, 2023Updated 2 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 7 months ago
- Azure JWT Token Manipulation Toolset☆730Dec 6, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆365Dec 13, 2025Updated 4 months ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆418Apr 12, 2026Updated 3 weeks ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆807Apr 2, 2026Updated last month
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- Abusing Azure services over C2☆370Jan 20, 2026Updated 3 months ago
- BloodHound Attack Research Kit☆594Mar 18, 2025Updated last year
- Maximizing BloodHound. Max is a good boy.☆533Apr 25, 2025Updated last year
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆189Jun 22, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,078Apr 29, 2026Updated last week
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆341Jun 6, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,701Jan 8, 2024Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆649Mar 20, 2024Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,145Jun 10, 2024Updated last year
- ☆103Oct 27, 2022Updated 3 years ago
- A C# utility for interacting with SCCM☆690Mar 30, 2026Updated last month
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆419Jan 27, 2024Updated 2 years ago
- XLL Phishing Tradecraft☆441May 24, 2022Updated 3 years ago