xforcered / SCMKit
Source Code Management Attack Toolkit
☆128Updated 2 years ago
Alternatives and similar repositories for SCMKit:
Users that are interested in SCMKit are comparing it to the libraries listed below
- SpecterOps Presentations☆185Updated 2 months ago
- C2 Automation using Linode☆78Updated 2 years ago
- ☆126Updated 6 months ago
- Hybrid AD utilities for ROADtools☆67Updated last month
- ☆176Updated last month
- A Red Team Activity Hub☆182Updated this week
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆155Updated 4 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆113Updated 4 years ago
- ☆112Updated 3 years ago
- Artifact monitoring that ensures fairplay☆75Updated last week
- Automated exploitation of MSSQL servers at scale☆102Updated last week
- ☆144Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆99Updated 2 years ago
- ☆113Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆249Updated last year
- ☆155Updated 2 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆90Updated last year
- A Python POC for CRED1 over SOCKS5☆139Updated 3 months ago
- Easy red team phishing with Puppeteer☆126Updated last year
- pysnaffler☆88Updated 2 weeks ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆183Updated last month
- OPSEC safe Kerberoasting in C#☆189Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆166Updated last year
- Abuse Azure API permissions for red teaming☆61Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Collection of tools to use with Azure Applications☆107Updated last year
- Network penetration testing toolset wrapper☆81Updated 2 years ago