authomize / okta_scim_attack_toolLinks
☆39Updated 2 years ago
Alternatives and similar repositories for okta_scim_attack_tool
Users that are interested in okta_scim_attack_tool are comparing it to the libraries listed below
Sorting:
- Living off the False Positive!☆37Updated 4 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- ☆83Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- ☆11Updated last month
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆28Updated 10 months ago
- Threat Simulation Indexes☆38Updated last month
- Default Detections for EDR☆96Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ☆35Updated 2 months ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- ☆100Updated 2 years ago
- Azure AD enumeration over MS Graph☆81Updated 2 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆11Updated 2 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆57Updated 3 months ago
- Enumerate and check domains for Azure tenants☆58Updated 3 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- ☆63Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆88Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 9 months ago
- ☆25Updated 3 years ago