Microsoft Azure Exploitation Framework
☆59Jun 30, 2021Updated 4 years ago
Alternatives and similar repositories for lava
Users that are interested in lava are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.☆19Jul 17, 2022Updated 3 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 8 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,378Mar 15, 2026Updated 2 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆754Jul 29, 2025Updated 9 months ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Hikvision camera backdoor exploit for beef framework (hikvision versions 5.2.0 - 5.3.9)☆19Aug 12, 2020Updated 5 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- PowerShell framework to assess Azure security☆1,276Oct 18, 2025Updated 7 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ☆31Jan 30, 2021Updated 5 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,700Jan 8, 2024Updated 2 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Apr 28, 2026Updated 3 weeks ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Exploit for win10 SMB3.1☆17Apr 5, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A generator for malicious DLL files for DLL Hijacking attacks☆33Dec 6, 2019Updated 6 years ago
- Simple tool to find code caves in Portable Executable (PE) files.☆24Oct 25, 2018Updated 7 years ago
- Lateral Movement graph for Azure Active Directory☆127Dec 8, 2022Updated 3 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Rusty Impersonate☆105Oct 15, 2025Updated 7 months ago
- networked status aggregator sees all☆14Apr 26, 2021Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆33Jan 1, 2020Updated 6 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- ☆15Aug 21, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Recon Automation☆11Sep 14, 2024Updated last year
- ☆22Jun 18, 2020Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 3 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 9 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- Cloud Security Tools☆16Aug 17, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆79Dec 7, 2025Updated 5 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 13, 2026Updated last month
- Customizable Security Scanner written in Go☆16Jul 6, 2016Updated 9 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 8 years ago
- Application which generates the structure and related files necessary for developing a Data Exchange Layer (DXL) integration with Python☆12Mar 17, 2020Updated 6 years ago
- ☆14May 17, 2018Updated 8 years ago