☆103Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for ROADtoken
Users that are interested in ROADtoken are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆159Dec 14, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆97Mar 8, 2023Updated 3 years ago
- ☆30Aug 19, 2020Updated 5 years ago
- Tool to perform lateral movement between AAD joined devices☆67Jun 8, 2022Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆201Aug 7, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆63Jan 2, 2024Updated 2 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,602Feb 5, 2026Updated 3 months ago
- Azure JWT Token Manipulation Toolset☆730Dec 6, 2024Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆195Feb 5, 2023Updated 3 years ago
- BloodHound with a twist of cloud☆82Jul 28, 2020Updated 5 years ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆27Feb 11, 2023Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Oct 3, 2020Updated 5 years ago
- ☆163Feb 8, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆107Jul 31, 2024Updated last year
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 4 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆354Feb 23, 2024Updated 2 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆794Aug 26, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Beacon Object Files for roasting Active Directory☆238Feb 21, 2022Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆128Jun 17, 2025Updated 11 months ago
- ☆21Sep 23, 2025Updated 7 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- ☆383Aug 7, 2023Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆284Nov 4, 2022Updated 3 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆39Sep 26, 2022Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆144Jan 9, 2022Updated 4 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 8 months ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆107Jun 27, 2024Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- ☆20Mar 9, 2021Updated 5 years ago