xforcered / SCMKitLinks
Source Code Management Attack Toolkit
☆135Updated 3 years ago
Alternatives and similar repositories for SCMKit
Users that are interested in SCMKit are comparing it to the libraries listed below
Sorting:
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- SpecterOps Presentations☆209Updated 2 weeks ago
- ☆188Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Updated 2 years ago
- Artifact monitoring that ensures fairplay☆78Updated 11 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Updated 2 years ago
- ☆119Updated 4 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 2 years ago
- AAD related enumeration in Nim☆133Updated 2 years ago
- Easy red team phishing with Puppeteer☆134Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆197Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- Abuse Azure API permissions for red teaming☆69Updated 2 years ago
- ☆105Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- ☆223Updated 2 years ago
- Collection of tools to use with Azure Applications☆112Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- ☆120Updated 9 months ago
- ☆129Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Updated 5 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year
- Tools for attacking Azure Function Apps☆87Updated 2 months ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆239Updated 2 years ago
- ☆121Updated 2 years ago
- ☆62Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆151Updated last year
- Quick and dirty dynamic redirect.rules generator☆168Updated 3 years ago