Microsoft Azure Exploitation Framework
☆59Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for lava
Users that are interested in lava are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.☆20Jul 17, 2022Updated 3 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 8 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,342Mar 15, 2026Updated 3 weeks ago
- Penetration Testing Azure for Ethical Hackers, published by Packt☆113Dec 19, 2024Updated last year
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆748Jul 29, 2025Updated 8 months ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- Hikvision camera backdoor exploit for beef framework (hikvision versions 5.2.0 - 5.3.9)☆20Aug 12, 2020Updated 5 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- PowerShell framework to assess Azure security☆1,266Oct 18, 2025Updated 5 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ☆30Jan 30, 2021Updated 5 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,696Jan 8, 2024Updated 2 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 6 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆33Dec 6, 2019Updated 6 years ago
- Lateral Movement graph for Azure Active Directory☆127Dec 8, 2022Updated 3 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Rusty Impersonate☆104Oct 15, 2025Updated 5 months ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 4 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- ☆15Aug 21, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Recon Automation☆11Sep 14, 2024Updated last year
- ☆22Jun 18, 2020Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Scrape Twitter for long hashtags that could be used as passwords☆10Jan 4, 2017Updated 9 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- Cloud Security Tools☆16Aug 17, 2020Updated 5 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆78Dec 7, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated last year
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Customizable Security Scanner written in Go☆16Jul 6, 2016Updated 9 years ago
- ☆14May 17, 2018Updated 7 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- Sample code for my article in DotNetCurry magazine on scanning barcodes. In this sample you can generate and scan QR codes that contain a…☆18Aug 14, 2020Updated 5 years ago
- A Terraform reproducer for IngressNightmare☆26Mar 26, 2025Updated last year