☆102Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for ROADtoken
Users that are interested in ROADtoken are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆157Dec 14, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆95Mar 8, 2023Updated 3 years ago
- ☆30Aug 19, 2020Updated 5 years ago
- Tool to perform lateral movement between AAD joined devices☆66Jun 8, 2022Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆200Aug 7, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆64Jan 2, 2024Updated 2 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,571Feb 5, 2026Updated 2 months ago
- Azure JWT Token Manipulation Toolset☆723Dec 6, 2024Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆193Feb 5, 2023Updated 3 years ago
- BloodHound with a twist of cloud☆82Jul 28, 2020Updated 5 years ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆27Feb 11, 2023Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆160Feb 8, 2025Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆105Jul 31, 2024Updated last year
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆345Feb 23, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆784Aug 26, 2025Updated 7 months ago
- Beacon Object Files for roasting Active Directory☆237Feb 21, 2022Updated 4 years ago
- ☆122Jun 17, 2025Updated 9 months ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆21Sep 23, 2025Updated 6 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- ☆382Aug 7, 2023Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆282Nov 4, 2022Updated 3 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- ☆39Sep 26, 2022Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆143Jan 9, 2022Updated 4 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆107Jun 27, 2024Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- ☆22Jun 21, 2022Updated 3 years ago