☆107Jan 4, 2023Updated 3 years ago
Alternatives and similar repositories for AzTokenFinder
Users that are interested in AzTokenFinder are comparing it to the libraries listed below
Sorting:
- ☆104Oct 27, 2022Updated 3 years ago
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- ☆301Oct 29, 2024Updated last year
- ☆223Oct 22, 2023Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Mar 1, 2024Updated last year
- ☆65Jan 2, 2024Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆714Dec 6, 2024Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆302Sep 7, 2023Updated 2 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆179Feb 14, 2023Updated 3 years ago
- DPAPI looting remotely and locally in Python☆541Oct 7, 2025Updated 4 months ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Jan 14, 2023Updated 3 years ago
- ☆159Apr 17, 2024Updated last year
- Lockless BOF☆79May 2, 2025Updated 9 months ago
- ☆101Oct 7, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated last week
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- .NET/PowerShell/VBA Offensive Security Obfuscator☆515Feb 1, 2024Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆339Feb 23, 2024Updated 2 years ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- Your template-based BloodHound terminal companion tool☆447Jan 21, 2026Updated last month
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 6 months ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 2 months ago
- CA Optics - Azure AD Conditional Access Gap Analyzer☆334Aug 28, 2024Updated last year
- Roast in the Middle☆294Sep 19, 2025Updated 5 months ago