You can check below blog post on attacks related to azure storage.
☆13Apr 8, 2021Updated 4 years ago
Alternatives and similar repositories for Az-Blob-Attacker
Users that are interested in Az-Blob-Attacker are comparing it to the libraries listed below
Sorting:
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- SCEPman | Cloud-based Certification Authority☆17Updated this week
- various python scripts☆16Jun 15, 2021Updated 4 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Jun 30, 2023Updated 2 years ago
- Other tools developed by CIRT.net☆23Aug 2, 2020Updated 5 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- This repo is for the Linkedin Learning course: Terraform: Managing Network Infrastructure☆12Mar 29, 2024Updated last year
- A way to use XInput to insert PIN for login, useful for handheld devices that does not have Fingerprint or face reco☆12Nov 3, 2024Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Yet another property management system☆10Oct 17, 2025Updated 4 months ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- CloudGraph managed policy packs☆10May 17, 2023Updated 2 years ago
- ซอร์สโค้ดและไฟล์ต่างๆสำหรับหนังสือ "คู่มือเขียนแอพ Android ด้วย Android Studio"☆10Oct 4, 2015Updated 10 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Oct 29, 2024Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 6 months ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆39Jan 31, 2026Updated last month
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- This is the official repository for the CarPi project.☆10Jul 16, 2019Updated 6 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- Azure Policy development should be just like normal development with unit testing capabilities. This project tries to enable that.☆14Jan 13, 2025Updated last year
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- ☆17Aug 3, 2025Updated 7 months ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Refactoring for 51pwn online☆13Dec 9, 2022Updated 3 years ago
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- Control Frame Attack Vulnerability Detection Tool (GitLab Mirror)☆12Dec 2, 2024Updated last year
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Proof of concept to test POODLE over TLS☆11Mar 13, 2015Updated 10 years ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 3 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago