cyberark / BlobHunterLinks
Find exposed data in Azure with this public blob scanner
☆345Updated last year
Alternatives and similar repositories for BlobHunter
Users that are interested in BlobHunter are comparing it to the libraries listed below
Sorting:
- ☆150Updated 4 years ago
- Unlocking Serverless Computing to Assess Security Controls☆261Updated last year
- ☆173Updated 2 years ago
- AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic pic…☆208Updated 10 months ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆139Updated 3 years ago
- ☆192Updated last month
- Python script that performs email address validation against Office 365 without submitting login attempts.☆369Updated 5 years ago
- ☆615Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆363Updated 4 months ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆236Updated 3 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆288Updated last year
- Audit program for AzureAD☆149Updated 2 years ago
- retrieve information via O365 and AzureAD with a valid cred☆730Updated 3 years ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆408Updated 8 months ago
- Security auditing tool for Azure environments☆581Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆222Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆443Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆477Updated last year
- Adam Raffe and Tom Wilde's Azure Security Lab☆66Updated 7 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆157Updated last year
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆181Updated last month
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Active Directory Lab for Penetration Testing☆52Updated 4 months ago
- ☆139Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆161Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆694Updated 11 months ago
- Microsoft Azure Exploitation Framework☆59Updated 4 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆237Updated 5 years ago
- Resolves an IP address to the cloud provider it is hosted on☆97Updated 2 weeks ago