n0tspam / delepwnView external linksLinks
DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegation (DWD) misconfigurations in Google Cloud Platform (GCP) environments. This tool helps security professionals and administrators evaluate their organization's exposure to potential DWD-based attacks.
☆37Aug 8, 2025Updated 6 months ago
Alternatives and similar repositories for delepwn
Users that are interested in delepwn are comparing it to the libraries listed below
Sorting:
- ☆16Dec 7, 2025Updated 2 months ago
- ☆17Jan 9, 2025Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 6 months ago
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated 11 months ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 2 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 3 weeks ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 8 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated last month
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Jan 25, 2026Updated 3 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆284May 16, 2025Updated 9 months ago
- ☆21Jan 8, 2026Updated last month
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated 11 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Dec 7, 2025Updated 2 months ago
- ☆43Jul 17, 2025Updated 6 months ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 10 months ago
- ☆54Jan 21, 2025Updated last year
- ☆31Dec 5, 2024Updated last year
- Mapping of open-source detection rules and atomic tests.☆195Updated this week
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- ☆33Mar 19, 2025Updated 10 months ago
- ☆26Mar 11, 2025Updated 11 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆41Jan 6, 2026Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109May 30, 2025Updated 8 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆159Updated this week
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆19Apr 27, 2025Updated 9 months ago
- Automated Cloud Misconfiguration Testing☆23Jun 20, 2025Updated 7 months ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.