mattrotlevi / lavaLinks
Microsoft Azure Exploitation Framework
☆57Updated 4 years ago
Alternatives and similar repositories for lava
Users that are interested in lava are comparing it to the libraries listed below
Sorting:
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- Lateral Movement graph for Azure Active Directory☆123Updated 2 years ago
- ☆137Updated 2 years ago
- Resolves an IP address to the cloud provider it is hosted on☆96Updated this week
- BloodHound with a twist of cloud☆81Updated 5 years ago
- This script is a multi-threaded Okta password sprayer.☆72Updated last year
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆86Updated 8 months ago
- ☆69Updated 3 years ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- A tool for auditing network shares in an Active Directory environment☆42Updated 6 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Simple parser framework.☆26Updated 2 years ago
- Resources for our Active Directory security workshops☆140Updated 3 years ago
- Fast offline auditing of Active Directory passwords using Python.☆164Updated 11 months ago
- ☆150Updated 4 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated last year
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆147Updated 4 years ago
- A PowerShell script for performing a build review of a Windows host☆23Updated 6 years ago
- Protocol agnostic online password guessing API.☆83Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- ☆79Updated 5 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- ☆140Updated 5 years ago
- Microsoft External Attack Tool☆179Updated 2 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- ☆70Updated last year
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆172Updated 6 years ago