xforcered / SCMKit
Source Code Management Attack Toolkit
☆129Updated 2 years ago
Alternatives and similar repositories for SCMKit:
Users that are interested in SCMKit are comparing it to the libraries listed below
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- ☆181Updated 4 months ago
- Hybrid AD utilities for ROADtools☆72Updated 2 months ago
- ☆117Updated 3 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆118Updated 4 years ago
- ☆121Updated last year
- SpecterOps Presentations☆191Updated 2 weeks ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆170Updated 2 years ago
- Artifact monitoring that ensures fairplay☆75Updated 2 months ago
- ☆150Updated 2 months ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- ☆142Updated 3 weeks ago
- AAD related enumeration in Nim☆129Updated last year
- ☆157Updated 5 months ago
- OPSEC safe Kerberoasting in C#☆191Updated 2 years ago
- Abuse Azure API permissions for red teaming☆64Updated 2 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆172Updated 7 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- Collection of tools to use with Azure Applications☆108Updated last year
- ☆106Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆231Updated last year
- ☆117Updated 3 weeks ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- Get Fine Grained Password Policy☆69Updated this week
- Tools for attacking Azure Function Apps☆70Updated 5 months ago