JumpsecLabs / TokenSmith
TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of the box with many popular Azure post exploitation tools.
☆259Updated last month
Alternatives and similar repositories for TokenSmith:
Users that are interested in TokenSmith are comparing it to the libraries listed below
- ☆199Updated last month
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆166Updated 6 months ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆280Updated 3 weeks ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆136Updated 3 weeks ago
- Abusing Intune for Lateral Movement over C2☆327Updated last month
- ☆177Updated 3 months ago
- An ADCS honeypot to catch attackers in your internal network.☆283Updated 8 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆250Updated last year
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆270Updated 3 weeks ago
- BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfi…☆444Updated 3 weeks ago
- ☆174Updated 3 months ago
- Azure Post Exploitation Framework☆187Updated 3 weeks ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆332Updated 3 months ago
- A BloodHound collector for Microsoft Configuration Manager☆308Updated 2 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆100Updated 6 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆667Updated last month
- User Enumeration of Microsoft Teams users via API☆148Updated 11 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆217Updated last month
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆168Updated 6 months ago
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- Assess the security of your Active Directory with few or all privileges.☆301Updated last week
- Monitor your PingCastle scans to highlight the rule diff between two scans☆109Updated 7 months ago
- Retired TrustedSec Capabilities☆246Updated 3 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆144Updated 3 months ago
- Azure AD cheatsheet for the CARTP course☆108Updated 2 years ago
- Azure mindmap for penetration tests☆179Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆180Updated 11 months ago
- ☆74Updated this week
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year