Serverless AITM Simulation Framework for Entra ID and M365
☆226Dec 29, 2025Updated 3 months ago
Alternatives and similar repositories for TokenFlare
Users that are interested in TokenFlare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 3 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆52Sep 10, 2025Updated 7 months ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆100Jan 10, 2026Updated 3 months ago
- A small How-To on creating your own weaponized WSL file☆125Jul 23, 2025Updated 8 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- ☆16Jun 15, 2025Updated 9 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆150Dec 6, 2025Updated 4 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Creating them Golden Tickets☆14Aug 16, 2025Updated 7 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆439Jun 27, 2025Updated 9 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆111Jan 26, 2026Updated 2 months ago
- The DCERPC only printerbug.py version☆215Oct 30, 2025Updated 5 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 3 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,241Dec 31, 2025Updated 3 months ago
- ☆48Dec 5, 2025Updated 4 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆24Mar 19, 2026Updated 3 weeks ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 9 months ago
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 8 months ago
- A BloodHound collector for Microsoft Configuration Manager☆396Jul 7, 2025Updated 9 months ago
- ☆31May 16, 2024Updated last year
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆250Dec 18, 2025Updated 3 months ago
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆184Mar 2, 2026Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆300Mar 28, 2026Updated 2 weeks ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆383Dec 13, 2024Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆68Dec 25, 2025Updated 3 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 8 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 9 months ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- ☆50Jun 4, 2025Updated 10 months ago