n0tspam / delepwnLinks
DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegation (DWD) misconfigurations in Google Cloud Platform (GCP) environments. This tool helps security professionals and administrators evaluate their organization's exposure to potential DWD-based attacks.
☆33Updated last month
Alternatives and similar repositories for delepwn
Users that are interested in delepwn are comparing it to the libraries listed below
Sorting:
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- IP address filter by City☆11Updated 5 months ago
- A user enumeration tool for Slack.☆28Updated last year
- Vast.ai Password Kracking☆59Updated this week
- Scripts that automate portions of pentests.☆50Updated last month
- Claude MCP server to perform analysis on ROADrecon data☆41Updated 2 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆41Updated 5 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- ☆31Updated 2 weeks ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 5 months ago
- Living Off Security Tools☆45Updated 7 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 3 months ago
- Webshell agent in aspx and php☆21Updated 2 weeks ago
- CaptainCredz is a modular and discreet password-spraying tool.☆112Updated 2 weeks ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 7 months ago
- ☆77Updated last year
- Automatically deploy Nemesis☆21Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 3 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- Addon for BHCE☆47Updated 2 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆13Updated 9 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆56Updated last month
- ☆17Updated 5 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆19Updated last month
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- self-hosted Azure OSINT tool☆30Updated 9 months ago
- ☆32Updated 2 years ago