Request device ticket/token using the device's MSA
☆38Aug 25, 2025Updated 6 months ago
Alternatives and similar repositories for DeviceToken
Users that are interested in DeviceToken are comparing it to the libraries listed below
Sorting:
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 4 months ago
- ☆21Apr 30, 2025Updated 10 months ago
- Bloodhound python Ingestor using ADWS☆31Feb 4, 2026Updated 3 weeks ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Mar 6, 2025Updated 11 months ago
- Evasive Payload Delivery Server & C2 Redirector☆112Nov 3, 2025Updated 3 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆18Jun 20, 2025Updated 8 months ago
- y4er的ysoserial修改版,加入mysql不出网pipe文件生成☆24Jan 30, 2026Updated last month
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆15May 30, 2025Updated 8 months ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ☆12May 21, 2025Updated 9 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- ☆17Jan 9, 2025Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- Local SYSTEM auth trigger for relaying☆168Jul 22, 2025Updated 7 months ago
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated 3 weeks ago
- Active Directory Authentication Library☆90Nov 7, 2025Updated 3 months ago
- ☆33Mar 19, 2025Updated 11 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 7 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated last year
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Sep 22, 2025Updated 5 months ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆42Dec 30, 2025Updated 2 months ago
- ☆50Jun 4, 2025Updated 8 months ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆54Jan 27, 2026Updated last month
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- A lightweight command sandbox for Linux, secure-by-default, built on Landlock.☆46Updated this week
- DNS Tunneling as net.Conn☆16Dec 22, 2024Updated last year
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year