HuskyHacks / SharpTokenFinderLinks
C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps
☆144Updated last year
Alternatives and similar repositories for SharpTokenFinder
Users that are interested in SharpTokenFinder are comparing it to the libraries listed below
Sorting:
- Lateral Movement☆125Updated 2 years ago
- ☆120Updated 10 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆102Updated 9 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- A Python POC for CRED1 over SOCKS5☆164Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆94Updated last year
- Decrypt Veeam database passwords☆221Updated last month
- ☆94Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 3 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Updated last year
- ☆216Updated last year
- Cortex XDR Config Extractor☆135Updated 2 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆213Updated last year
- ☆166Updated last year
- Just some random Red Team Scripts that can be useful☆154Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆186Updated last year
- Collection of random RedTeam scripts.☆211Updated last year
- PowerShell Reverse Shell☆80Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 8 months ago
- ☆159Updated 9 months ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆135Updated last year
- Adversary Emulation Framework☆129Updated 7 months ago
- ☆75Updated 10 months ago
- Automated exploitation of MSSQL servers at scale☆127Updated this week
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 11 months ago