Terraform playbook of a vulnerable Azure deployment
☆10Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for VulnerableAzure
Users that are interested in VulnerableAzure are comparing it to the libraries listed below
Sorting:
- ☆10Nov 21, 2023Updated 2 years ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 4 months ago
- Library and tools to access the Windows SuperFetch database format☆13Nov 29, 2025Updated 3 months ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Repository for archiving Cobalt Strike configuration☆36Feb 28, 2026Updated last week
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated 11 months ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Jul 17, 2024Updated last year
- ☆44Sep 22, 2022Updated 3 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 6 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- ☆12Jun 22, 2021Updated 4 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- ☆42Jul 23, 2018Updated 7 years ago
- Find out cryptocurrency arbitrage opportunities across exchanges. (No Fiat withdrawal involved)☆11Jan 30, 2018Updated 8 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Bash scripts for use on Linux for minting Cardano NFTs☆12Aug 2, 2022Updated 3 years ago
- Enhanced version of finddupe, a duplicate file detector for Windows☆11Dec 31, 2025Updated 2 months ago
- ☆11Jun 24, 2024Updated last year
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 6 months ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago