dirkjanm / ROADtoken
☆85Updated 4 years ago
Alternatives and similar repositories for ROADtoken:
Users that are interested in ROADtoken are comparing it to the libraries listed below
- ☆131Updated last year
- GolenGMSA tool for working with GMSA passwords☆139Updated 10 months ago
- ☆100Updated 2 years ago
- ☆147Updated 3 weeks ago
- Collection of tools to use with Azure Applications☆107Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆120Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 3 years ago
- Hybrid AD utilities for ROADtools☆68Updated last month
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆88Updated 9 months ago
- GoldenSAML Attack Libraries and Framework☆68Updated 8 months ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- ☆76Updated 10 months ago
- ☆69Updated 3 years ago
- ☆158Updated 3 months ago
- Azure AD cheatsheet for the CARTP course☆106Updated 2 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆122Updated 2 years ago
- ☆85Updated 2 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- AAD related enumeration in Nim☆128Updated last year
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆95Updated last year
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆64Updated 4 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆52Updated 9 months ago
- Tool to perform lateral movement between AAD joined devices☆55Updated 2 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆54Updated 2 weeks ago
- Updated 11 months ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆119Updated 3 years ago
- ☆35Updated last year
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆98Updated 8 months ago