xforcered / SCMKitLinks
Source Code Management Attack Toolkit
☆134Updated 3 years ago
Alternatives and similar repositories for SCMKit
Users that are interested in SCMKit are comparing it to the libraries listed below
Sorting:
- ☆190Updated last year
- SpecterOps Presentations☆211Updated last week
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Updated 2 years ago
- Artifact monitoring that ensures fairplay☆79Updated last year
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Updated 2 years ago
- AAD related enumeration in Nim☆132Updated 2 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year
- Abuse Azure API permissions for red teaming☆71Updated 3 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 3 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Collection of tools to use with Azure Applications☆112Updated 2 years ago
- ☆65Updated 3 weeks ago
- ☆121Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ☆119Updated 4 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- ☆105Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Updated last year
- Automated exploitation of MSSQL servers at scale☆127Updated this week
- ☆105Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- LDAP Querying without the Suck☆110Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Updated last week
- Easy red team phishing with Puppeteer☆133Updated 3 years ago
- ☆225Updated 2 years ago