☆38Jun 9, 2021Updated 4 years ago
Alternatives and similar repositories for aws-sso-device-code-authentication
Users that are interested in aws-sso-device-code-authentication are comparing it to the libraries listed below
Sorting:
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ☆61Aug 30, 2021Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Powershell script that decrypts the data stored within a Thycotic Secret Server☆84Aug 3, 2020Updated 5 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- A Python tool to manage GitHub Organizations and perform backup☆21Jan 6, 2026Updated last month
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- ☆50Jun 4, 2025Updated 8 months ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- ☆16May 15, 2021Updated 4 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Aug 22, 2024Updated last year
- Utilizng an MCP Server to communicate with your C2☆86May 15, 2025Updated 9 months ago
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 11 months ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆104Jan 26, 2026Updated last month
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆94Mar 8, 2023Updated 2 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago
- A simple BOF that frees UDRLs☆122May 29, 2022Updated 3 years ago
- Scripts to enumerate and report on Entra Conditional Access☆41Sep 5, 2025Updated 5 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated 2 weeks ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- ☆10Jun 26, 2024Updated last year
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- ☆25Feb 9, 2022Updated 4 years ago