AzureAD Pentest
☆25Mar 24, 2022Updated 3 years ago
Alternatives and similar repositories for AzureAD-Pentest
Users that are interested in AzureAD-Pentest are comparing it to the libraries listed below
Sorting:
- ☆12Aug 25, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- ☆13Sep 8, 2024Updated last year
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆148May 5, 2022Updated 3 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 4 months ago
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated last year
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 3 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Simple script that checks a domain for email protections☆33Jul 29, 2020Updated 5 years ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 4 months ago
- A slightly more fun way to disable windows defender☆52May 4, 2025Updated 10 months ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Oct 29, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 7 months ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Sliver agent rewritten in C++☆49Sep 4, 2024Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆29Nov 18, 2025Updated 3 months ago
- Read a .TLScan file containing the PCIe Configuration Space and Generate a Write Mask☆11Sep 10, 2024Updated last year
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 4 months ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago