authomize / okta_scim_attack_tool
☆39Updated last year
Alternatives and similar repositories for okta_scim_attack_tool:
Users that are interested in okta_scim_attack_tool are comparing it to the libraries listed below
- ☆82Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Azure AD enumeration over MS Graph☆80Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 9 months ago
- ☆93Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 2 months ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- ☆100Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Living off the False Positive!☆33Updated 3 weeks ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Azure DevOps Services Attack Toolkit☆137Updated 6 months ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- ☆96Updated 2 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆17Updated 4 months ago
- ☆80Updated 3 months ago
- InfoSec Notes☆56Updated 10 months ago
- ☆54Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- ☆41Updated 2 years ago
- Tools for attacking Azure Function Apps☆68Updated 3 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆91Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆99Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- ☆63Updated 3 years ago