☆47Jan 31, 2024Updated 2 years ago
Alternatives and similar repositories for TeamsBreaker
Users that are interested in TeamsBreaker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- Eating 2FA for Breakfast☆57Nov 2, 2022Updated 3 years ago
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆31Jan 30, 2025Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- ☆123Oct 9, 2023Updated 2 years ago
- Artifact monitoring that ensures fairplay☆77Jan 29, 2025Updated last year
- ☆65Mar 15, 2024Updated 2 years ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆394Apr 3, 2024Updated last year
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆611Dec 9, 2025Updated 3 months ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆406Sep 26, 2024Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆238Aug 25, 2024Updated last year
- ☆160Apr 17, 2024Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆143Mar 9, 2024Updated 2 years ago
- ☆29May 10, 2024Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆32Sep 23, 2022Updated 3 years ago
- Living Off the Foreign Land setup scripts☆75Feb 26, 2025Updated last year
- ☆20Updated this week
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆441May 29, 2024Updated last year
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- adws enumeration bof☆169Feb 16, 2026Updated last month
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆345Sep 1, 2021Updated 4 years ago
- Library of BOFs to interact with SQL servers☆227Dec 3, 2025Updated 3 months ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago