authomize / mfa-bombing
☆35Updated 4 months ago
Alternatives and similar repositories for mfa-bombing
Users that are interested in mfa-bombing are comparing it to the libraries listed below
Sorting:
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- ☆32Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated last year
- ☆21Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 3 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆46Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- ☆33Updated last year
- ☆24Updated 3 years ago
- AutoPoC Generator HoneyPoC☆35Updated 3 weeks ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 6 months ago
- Silver SAML forgery tool☆50Updated last year
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 10 months ago
- 🌩️ Collection of BloodHound queries for Azure☆66Updated 4 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- A user enumeration tool for Slack.☆28Updated 11 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Default Detections for EDR☆96Updated last year
- ASR Configurator, Essentials and Atomic Testing☆40Updated last month
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- create a "simulated internet" cyber range environment☆16Updated 2 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- ☆55Updated last year