airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authentication attacks. airCross can locate AirWatch authentication endpoint, validate the authentication strategy of the environment, collect GroupID authentication values, conduct single-factor authentication, and perform…
☆47Jul 19, 2022Updated 3 years ago
Alternatives and similar repositories for airCross
Users that are interested in airCross are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆71Apr 17, 2025Updated 11 months ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Yet Another LinkedIn Scraper☆32Mar 9, 2023Updated 3 years ago
- The CAPTCHA-resilient contact scraper.☆49Nov 18, 2025Updated 4 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Dec 21, 2022Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆95Mar 8, 2023Updated 3 years ago
- ☆70Apr 21, 2021Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆723Dec 6, 2024Updated last year
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 5 years ago
- ☆216Dec 17, 2025Updated 3 months ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆107Aug 17, 2021Updated 4 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆443Aug 18, 2023Updated 2 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆379Dec 23, 2025Updated 3 months ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆289Aug 18, 2021Updated 4 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- ☆157Dec 14, 2023Updated 2 years ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated 2 months ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- ☆23May 28, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,261Mar 19, 2025Updated last year
- A SOCKS proxy for Citrix.☆97Dec 8, 2022Updated 3 years ago
- User Enumeration of Microsoft Teams users via API☆187Mar 16, 2026Updated 3 weeks ago
- ☆23Jun 17, 2024Updated last year
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago