☆178Apr 22, 2023Updated 2 years ago
Alternatives and similar repositories for XMGoat
Users that are interested in XMGoat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- ☆615Jun 1, 2023Updated 2 years ago
- Azure Security Resources and Notes☆1,734Feb 17, 2026Updated last month
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,696Jan 8, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆924Oct 30, 2024Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆270Sep 14, 2023Updated 2 years ago
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- ☆39Jul 29, 2021Updated 4 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆233Jun 17, 2022Updated 3 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆765Oct 14, 2023Updated 2 years ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated last month
- ☆89Jul 28, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆18Sep 14, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,582Feb 5, 2026Updated 2 months ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆507Mar 4, 2026Updated last month
- RDP Checker☆64Feb 23, 2024Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆341Jun 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆418May 29, 2024Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆560Mar 12, 2026Updated last month
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- A tool for pointesters to find candies in SharePoint☆282Nov 4, 2022Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆485Jul 9, 2024Updated last year
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆906Updated this week
- A C# utility for interacting with SCCM☆687Mar 30, 2026Updated 2 weeks ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,292Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆12Oct 9, 2022Updated 3 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 8 months ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Aug 4, 2021Updated 4 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆227Jul 30, 2021Updated 4 years ago