☆38Jun 9, 2021Updated 4 years ago
Alternatives and similar repositories for aws-sso-device-code-authentication
Users that are interested in aws-sso-device-code-authentication are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ☆61Aug 30, 2021Updated 4 years ago
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago
- A Python tool to manage GitHub Organizations and perform backup☆21Jan 6, 2026Updated 2 months ago
- ☆28Dec 28, 2017Updated 8 years ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- ☆16May 15, 2021Updated 4 years ago
- Utilizng an MCP Server to communicate with your C2☆88May 15, 2025Updated 10 months ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- A simple BOF that frees UDRLs☆122May 29, 2022Updated 3 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- Enumerate Microsoft Entra ID (Azure AD) fast☆111Jan 26, 2026Updated last month
- Powershell script that decrypts the data stored within a Thycotic Secret Server☆84Aug 3, 2020Updated 5 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- ☆50Jun 4, 2025Updated 9 months ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆95Mar 8, 2023Updated 3 years ago
- Collection of tools to use with Azure Applications☆113Oct 13, 2023Updated 2 years ago
- Collection of small JavaScript functions and scripts that can be used in the browser to interact with Lair☆22Mar 20, 2019Updated 7 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Script used to track airtags (using Apple's Find My-network through the Find My-app on macOS) and save the location history data to CSV f…☆14Nov 19, 2024Updated last year
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 7 months ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Dec 17, 2023Updated 2 years ago