authomize / mfa-bombingLinks
☆38Updated last year
Alternatives and similar repositories for mfa-bombing
Users that are interested in mfa-bombing are comparing it to the libraries listed below
Sorting:
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- ☆31Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- ☆76Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 11 months ago
- ☆35Updated 2 years ago
- ☆29Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated 2 years ago
- Azure AD enumeration over MS Graph☆82Updated 3 years ago
- tool for identifying guest relationships between companies☆103Updated last year
- ☆85Updated 3 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- ☆19Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- ☆41Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- A user enumeration tool for Slack.☆34Updated last year
- create a "simulated internet" cyber range environment☆19Updated 7 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆24Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated 3 weeks ago
- ☆21Updated 3 months ago
- ☆52Updated last year
- IP address filter by City☆12Updated 11 months ago