xforcered / SCMKit
Source Code Management Attack Toolkit
☆125Updated 2 years ago
Related projects: ⓘ
- Some scripts to support with importing large datasets into BloodHound☆75Updated 9 months ago
- ☆111Updated 3 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆102Updated 4 years ago
- Hybrid AD utilities for ROADtools☆59Updated last month
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆148Updated last year
- C2 Automation using Linode☆78Updated last year
- ☆117Updated last year
- ☆141Updated 10 months ago
- ☆114Updated 2 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆119Updated last month
- Artifact monitoring that ensures fairplay☆66Updated 11 months ago
- SpecterOps Presentations☆176Updated last month
- Red Team "Drop and Run" NAC (802.1x) Bypass☆66Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆76Updated 3 weeks ago
- ☆99Updated last year
- Custom Queries - Brought Up to BH4.1 syntax☆217Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆239Updated last year
- Azure AD cheatsheet for the CARTP course☆94Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆146Updated last year
- ☆144Updated 7 months ago
- ☆166Updated 6 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆116Updated 2 years ago
- ☆99Updated 3 years ago
- Collection of tools to use with Azure Applications☆107Updated 11 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆152Updated last year
- Automated exploitation of MSSQL servers at scale☆79Updated this week
- ☆110Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆95Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆131Updated last month