authomize / okta_scim_attack_tool
☆39Updated 2 years ago
Alternatives and similar repositories for okta_scim_attack_tool:
Users that are interested in okta_scim_attack_tool are comparing it to the libraries listed below
- Living off the False Positive!☆35Updated 2 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- ☆41Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆82Updated 2 years ago
- ☆63Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Default Detections for EDR☆96Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Azure AD enumeration over MS Graph☆80Updated 2 years ago
- ☆33Updated last year
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- ☆47Updated last week
- 🌩️ Collection of BloodHound queries for Azure☆63Updated 3 months ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆11Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Enumerate and check domains for Azure tenants☆58Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- ☆93Updated 2 years ago
- Abuse Azure API permissions for red teaming☆66Updated 2 years ago
- ☆35Updated 3 months ago