lutzenfried / Delegate
Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data
☆44Updated last year
Alternatives and similar repositories for Delegate:
Users that are interested in Delegate are comparing it to the libraries listed below
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆52Updated last year
- A Moodle Scanner☆39Updated 3 months ago
- Azure Service Subdomain Enumeration☆55Updated 6 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆38Updated 10 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆23Updated last year
- A script to automatically dump all URLs present in /server-status to a file locally.☆23Updated last month
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated 11 months ago
- ☆27Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 3 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆30Updated 11 months ago
- Discord C2 Profile for Mythic☆27Updated 3 weeks ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆78Updated last year
- ☆11Updated 8 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 6 months ago
- Proof of Concept Exploit for CVE-2024-9465☆28Updated 5 months ago
- Extract registry and NTDS secrets from local or remote disk images☆37Updated 6 months ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- Public repo of Nuclei scanner templates.☆18Updated last year
- ☆26Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Cobalt Strike BOFS☆15Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Open-Source Phishing Toolkit☆18Updated 3 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆83Updated last year