JumpsecLabs / TokenSmithLinks
TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of the box with many popular Azure post exploitation tools.
☆280Updated 4 months ago
Alternatives and similar repositories for TokenSmith
Users that are interested in TokenSmith are comparing it to the libraries listed below
Sorting:
- ☆218Updated 2 months ago
- An ADCS honeypot to catch attackers in your internal network.☆289Updated 11 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆361Updated 2 weeks ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆210Updated 8 months ago
- Abusing Azure services over C2☆338Updated last week
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆212Updated this week
- Assess the security of your Active Directory with few or all privileges.☆316Updated last month
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆251Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆320Updated 5 months ago
- ☆174Updated 5 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆227Updated 2 months ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆296Updated 3 months ago
- Azure Post Exploitation Framework☆199Updated 3 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆209Updated last week
- ☆178Updated 6 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆291Updated 3 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆173Updated 9 months ago
- Automatically run and populate a new instance of BH CE☆81Updated last month
- Some scripts to abuse kerberos using Powershell☆340Updated last year
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆102Updated 9 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆224Updated 4 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆142Updated 3 months ago
- BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfi…☆458Updated last month
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆153Updated last month
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆722Updated 3 weeks ago
- ☆166Updated last month
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆421Updated 2 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆147Updated 5 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆380Updated last month