Microsoft Azure Exploitation Framework
☆59Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for lava
Users that are interested in lava are comparing it to the libraries listed below
Sorting:
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Oct 9, 2021Updated 4 years ago
- EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.☆20Jul 17, 2022Updated 3 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,319Oct 29, 2025Updated 4 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆746Jul 29, 2025Updated 7 months ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- PowerShell module to play with Kerberos S4U extensions☆23Sep 14, 2017Updated 8 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- PowerShell framework to assess Azure security☆1,261Oct 18, 2025Updated 5 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,689Jan 8, 2024Updated 2 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 5 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆33Dec 6, 2019Updated 6 years ago
- Lateral Movement graph for Azure Active Directory☆127Dec 8, 2022Updated 3 years ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆65Nov 14, 2025Updated 4 months ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Jul 29, 2021Updated 4 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 4 years ago
- Rusty Impersonate☆104Oct 15, 2025Updated 5 months ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- ☆15Aug 21, 2021Updated 4 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- Cloud Security Tools☆16Aug 17, 2020Updated 5 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆78Dec 7, 2025Updated 3 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Customizable Security Scanner written in Go☆16Jul 6, 2016Updated 9 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- ☆14May 17, 2018Updated 7 years ago
- ☆12Apr 5, 2025Updated 11 months ago
- ☆17Mar 21, 2019Updated 6 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆95Jun 6, 2024Updated last year