cyberark / BlobHunterLinks
Find exposed data in Azure with this public blob scanner
☆347Updated last year
Alternatives and similar repositories for BlobHunter
Users that are interested in BlobHunter are comparing it to the libraries listed below
Sorting:
- ☆150Updated 4 years ago
- ☆174Updated 2 years ago
- Unlocking Serverless Computing to Assess Security Controls☆261Updated last year
- AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic pic…☆211Updated 11 months ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆373Updated 5 years ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆140Updated 3 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- ☆615Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆289Updated last year
- Audit program for AzureAD☆149Updated 2 years ago
- ☆192Updated last month
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆366Updated 6 months ago
- Security auditing tool for Azure environments☆583Updated 3 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆236Updated 3 years ago
- ☆139Updated 2 years ago
- Microsoft Azure Exploitation Framework☆59Updated 4 years ago
- Adam Raffe and Tom Wilde's Azure Security Lab☆67Updated 7 years ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆184Updated 2 months ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆407Updated 10 months ago
- Penetration Testing Azure for Ethical Hackers, published by Packt☆112Updated last year
- retrieve information via O365 and AzureAD with a valid cred☆730Updated 3 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆331Updated last year
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 9 months ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆479Updated last year
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆480Updated 3 weeks ago
- Azure JWT Token Manipulation Toolset☆705Updated last year
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- Active Directory Lab for Penetration Testing☆53Updated 5 months ago