☆100Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for ROADtoken
Users that are interested in ROADtoken are comparing it to the libraries listed below
Sorting:
- ☆155Dec 14, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆94Mar 8, 2023Updated 2 years ago
- Tool to perform lateral movement between AAD joined devices☆65Jun 8, 2022Updated 3 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- ☆53Oct 20, 2020Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆28Aug 19, 2020Updated 5 years ago
- Azure JWT Token Manipulation Toolset☆716Dec 6, 2024Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆191Feb 5, 2023Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,528Feb 5, 2026Updated 3 weeks ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆26Feb 11, 2023Updated 3 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 5 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- ☆159Feb 8, 2025Updated last year
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 4 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- BloodHound with a twist of cloud☆82Jul 28, 2020Updated 5 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆342Feb 23, 2024Updated 2 years ago
- ☆117Jun 17, 2025Updated 8 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 7 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Jan 14, 2023Updated 3 years ago