xforcered / SCMKitLinks
Source Code Management Attack Toolkit
☆133Updated 3 years ago
Alternatives and similar repositories for SCMKit
Users that are interested in SCMKit are comparing it to the libraries listed below
Sorting:
- Some scripts to support with importing large datasets into BloodHound☆81Updated last year
- SpecterOps Presentations☆208Updated 2 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆266Updated 2 years ago
- ☆186Updated 9 months ago
- AAD related enumeration in Nim☆131Updated 2 years ago
- C2 Automation using Linode☆84Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- ☆123Updated 2 years ago
- ☆117Updated 4 years ago
- Automated exploitation of MSSQL servers at scale☆117Updated last month
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆103Updated 2 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆117Updated 2 years ago
- Abuse Azure API permissions for red teaming☆68Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆180Updated 2 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆244Updated last year
- PowerShell Reverse Shell☆79Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Collection of tools to use with Azure Applications☆109Updated last year
- ☆191Updated 3 weeks ago
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆171Updated last month
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- using graph proxy to monitor teams user presence☆54Updated last year
- ☆119Updated 5 months ago
- ☆156Updated 7 months ago