When good OAuth apps go rogue. Documents observed OAuth application tradecraft
☆84Mar 19, 2026Updated last week
Alternatives and similar repositories for rogueapps
Users that are interested in rogueapps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆192Apr 16, 2025Updated 11 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆105Feb 6, 2025Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Jul 8, 2024Updated last year
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 11, 2026Updated 2 weeks ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- This is a powershell module used to access the Pax8 API☆19Apr 20, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Updated this week
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- ☆42Nov 13, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Generate datasets of cloud audit logs for common attacks☆235Mar 17, 2026Updated last week
- ☆30Aug 2, 2025Updated 7 months ago
- ☆17Jan 9, 2025Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 8 months ago
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 6 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆386Jan 23, 2025Updated last year
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆200Mar 18, 2026Updated last week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Dec 2, 2024Updated last year
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Feb 9, 2025Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Collection of all previous 1337UP CTF challenges.☆79Jan 6, 2025Updated last year
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆171Mar 20, 2026Updated last week
- AWS Attack Path Management Tool - Walking on the Moon☆263Dec 5, 2024Updated last year
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- ☆75Mar 19, 2025Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Dec 29, 2024Updated last year
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 10, 2026Updated 2 weeks ago