xforcered / SCMKitLinks
Source Code Management Attack Toolkit
☆134Updated 3 years ago
Alternatives and similar repositories for SCMKit
Users that are interested in SCMKit are comparing it to the libraries listed below
Sorting:
- ☆189Updated last year
- SpecterOps Presentations☆209Updated last month
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Updated 2 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- ☆119Updated 4 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Updated 2 years ago
- Artifact monitoring that ensures fairplay☆78Updated 11 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆189Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Updated 2 years ago
- A Red Team Activity Hub☆235Updated last week
- ☆120Updated 9 months ago
- AAD related enumeration in Nim☆132Updated 2 years ago
- Easy red team phishing with Puppeteer☆133Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- Abuse Azure API permissions for red teaming☆70Updated 2 years ago
- ☆197Updated 4 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year
- ☆105Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ☆105Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Updated 5 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆197Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆127Updated last month
- PowerShell Reverse Shell☆79Updated 2 years ago
- PowerShell Obfuscation and Data Science☆180Updated 3 years ago