Serverless AITM Simulation Framework for Entra ID and M365
☆232Dec 29, 2025Updated 4 months ago
Alternatives and similar repositories for TokenFlare
Users that are interested in TokenFlare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 6 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆129Jan 29, 2026Updated 3 months ago
- BOF template with boflink and mutator kit support☆51Jan 8, 2026Updated 4 months ago
- A practical client for ADWS in Golang.☆53Mar 3, 2026Updated 2 months ago
- A small How-To on creating your own weaponized WSL file☆127Jul 23, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆103Jan 10, 2026Updated 4 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- ☆16Jun 15, 2025Updated 11 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆152Dec 6, 2025Updated 5 months ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆37Apr 16, 2024Updated 2 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 9 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆444Jun 27, 2025Updated 10 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆75Dec 26, 2025Updated 4 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆134Jan 26, 2026Updated 3 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆93Sep 10, 2025Updated 8 months ago
- TokenCert☆103Nov 15, 2024Updated last year
- The DCERPC only printerbug.py version☆219Oct 30, 2025Updated 6 months ago
- Proof of concept for Kerberos Armoring abuse.☆84Dec 12, 2025Updated 5 months ago
- Initial Access and Post-Exploitation Tool for Entra ID and M365 with a browser-based GUI☆1,290May 4, 2026Updated 2 weeks ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆26Mar 19, 2026Updated 2 months ago
- ☆50Dec 5, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Adversary Emulation Framework☆131Jul 1, 2025Updated 10 months ago
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 9 months ago
- A BloodHound collector for Microsoft Configuration Manager☆401Jul 7, 2025Updated 10 months ago
- ☆31May 16, 2024Updated 2 years ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆261Dec 18, 2025Updated 5 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆309Mar 28, 2026Updated last month
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆385Dec 13, 2024Updated last year
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 5 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆401Jul 23, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated 3 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆307Sep 7, 2023Updated 2 years ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆68Dec 25, 2025Updated 4 months ago
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆200May 9, 2026Updated last week
- Abusing Azure services over C2☆372Jan 20, 2026Updated 4 months ago