Category: Open Source Tool

Microsoft Graph exploitation

Graphpython: The Swiss Army Knife for Microsoft Graph Exploitation

Graphpython Graphpython is a modular Python tool for cross-platform Microsoft Graph API enumeration and exploitation. It builds upon the capabilities of AADInternals (Killchain.ps1), GraphRunner, and TokenTactics(V2) to provide a comprehensive solution for interacting with...

pentest scanner

nacs: event-driven pentest scanner

nacs: event-driven pentest scanner Detect if the target machine is alive Service scan (regular & non-regular ports) poc detection (xray & nuclei format) Weak password blasting for services such as databases Common Vulnerability Exploitation...

cloud OSINT tool

cloud_enum: Multi-cloud OSINT tool

cloud_enum Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud. Currently enumerates the following: Amazon Web Services: Open / Protected S3 Buckets awsapps (WorkMail, WorkDocs, Connect, etc.) Microsoft Azure: Storage Accounts...

Legitimate WFP

EDRPrison: Silencing EDRs with Legitimate WFP Drivers

EDRPrison EDRPrison leverages a legitimate WFP callout driver, WinDivert, to effectively silence EDR systems. Drawing inspiration from tools like Shutter, FireBlock, and EDRSilencer, this project focuses on network-based evasion techniques. Unlike its predecessors, EDRPrison installs and loads an...