JumpsecLabs / TokenSmith
TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of the box with many popular Azure post exploitation tools.
☆247Updated 3 weeks ago
Alternatives and similar repositories for TokenSmith:
Users that are interested in TokenSmith are comparing it to the libraries listed below
- ☆190Updated this week
- A BloodHound collector for Microsoft Configuration Manager☆301Updated last month
- Abusing Intune for Lateral Movement over C2☆324Updated last week
- ☆176Updated 2 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆163Updated 5 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆248Updated last year
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆276Updated last month
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆132Updated last month
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆308Updated 2 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆257Updated 3 weeks ago
- ☆173Updated 2 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆211Updated 3 weeks ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆98Updated 5 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆193Updated last month
- Some scripts to abuse kerberos using Powershell☆327Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆163Updated 5 months ago
- Assess the security of your Active Directory with few or all privileges.☆261Updated last week
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆161Updated 4 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆142Updated 2 months ago
- User Enumeration of Microsoft Teams users via API☆138Updated 10 months ago
- An ADCS honeypot to catch attackers in your internal network.☆279Updated 7 months ago
- Azure Post Exploitation Framework☆164Updated 3 weeks ago
- Azure mindmap for penetration tests☆175Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 4 months ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆91Updated last month
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆102Updated 9 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆650Updated 2 weeks ago
- BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfi…☆438Updated this week
- ☆139Updated 2 months ago