christophetd / aws-sso-device-code-authenticationLinks
☆34Updated 4 years ago
Alternatives and similar repositories for aws-sso-device-code-authentication
Users that are interested in aws-sso-device-code-authentication are comparing it to the libraries listed below
Sorting:
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- Tools for attacking Azure Function Apps☆85Updated 2 weeks ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- ☆78Updated 3 months ago
- ☆50Updated last year
- Qemuno Framework☆24Updated 3 years ago
- ☆15Updated 3 years ago
- ☆21Updated last month
- ☆59Updated 2 years ago
- ☆60Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- ☆46Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆102Updated 2 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆20Updated 3 months ago
- Artifact monitoring that ensures fairplay☆78Updated 9 months ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- ☆18Updated last year
- ☆35Updated 3 weeks ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆61Updated last year
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 8 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 3 months ago
- Silver SAML forgery tool☆56Updated last year
- ☆25Updated 3 years ago
- ☆28Updated 5 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated 2 years ago
- Bloodhound agent for Mythic☆21Updated 6 months ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- ☆18Updated 3 years ago