Request device ticket/token using the device's MSA
☆38Aug 25, 2025Updated 7 months ago
Alternatives and similar repositories for DeviceToken
Users that are interested in DeviceToken are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SCEP request tool for AD CS and Intune☆75Oct 24, 2025Updated 5 months ago
- General Purpose OpSec Server☆113Mar 13, 2026Updated 3 weeks ago
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 8 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- Active Directory Authentication Library☆93Nov 7, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Mar 6, 2025Updated last year
- Boot-to-Breach red team lab on AWS. Mythic, Sliver, and Havoc C2 behind a production-style Apache redirector. Deployed via Terraform, to …☆176Mar 18, 2026Updated 3 weeks ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago
- y4er的ysoserial修改版,加入mysql不出网pipe文件生成☆26Mar 8, 2026Updated last month
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 9 months ago
- ☆16May 30, 2025Updated 10 months ago
- ☆13May 21, 2025Updated 10 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- ☆49Apr 9, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆25Jul 5, 2023Updated 2 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated last year
- Bloodhound python Ingestor using ADWS☆34Feb 4, 2026Updated 2 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- CLI tool to interact with the BloodHound CE API☆70Mar 6, 2026Updated last month
- ☆26Aug 11, 2025Updated 7 months ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- Shellcode loader written in C and Assembly utilizing direct or indirect syscalls to evade UM EDR hooks☆139Dec 22, 2024Updated last year
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tool for viewing NTDS.dit☆198Mar 14, 2025Updated last year
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Mar 7, 2026Updated last month
- ☆59Feb 19, 2026Updated last month
- PoC☆12Apr 7, 2025Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Rust crate to run commands as another user☆54Feb 12, 2026Updated last month
- DNS Tunneling as net.Conn☆16Dec 22, 2024Updated last year
- tsh多终端代理通信☆19Feb 26, 2025Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ☆21Apr 30, 2025Updated 11 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆78Mar 24, 2026Updated 2 weeks ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 8 months ago
- ☆17Jan 9, 2025Updated last year
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆36Feb 16, 2026Updated last month