VitthalS / Az-Blob-AttackerLinks
You can check below blog post on attacks related to azure storage.
☆13Updated 4 years ago
Alternatives and similar repositories for Az-Blob-Attacker
Users that are interested in Az-Blob-Attacker are comparing it to the libraries listed below
Sorting:
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- A script used to query the dehashed API and filter for more useful results☆16Updated 4 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- ☆27Updated 2 years ago
- Tool to spray AWS Console IAM Logins☆29Updated 3 years ago
- ☆26Updated 3 years ago
- ☆12Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆76Updated 2 months ago
- Python Script for SAML2 Authentication Passwordspray☆39Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 2 months ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- ☆52Updated last year
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆21Updated 7 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago