dirkjanm / ROADtokenLinks
☆92Updated 4 years ago
Alternatives and similar repositories for ROADtoken
Users that are interested in ROADtoken are comparing it to the libraries listed below
Sorting:
- ☆144Updated last year
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- GolenGMSA tool for working with GMSA passwords☆150Updated this week
- Collection of tools to use with Azure Applications☆109Updated last year
- ☆100Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- ☆151Updated 4 months ago
- ☆92Updated last week
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- ☆160Updated 7 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- GoldenSAML Attack Libraries and Framework☆73Updated last year
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆321Updated 2 years ago
- ☆88Updated 2 years ago
- SpecterOps Presentations☆204Updated last month
- ☆248Updated last year
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆101Updated last year
- Hybrid AD utilities for ROADtools☆80Updated last month
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆188Updated 3 years ago
- AAD related enumeration in Nim☆129Updated last year
- Azure AD cheatsheet for the CARTP course☆119Updated 3 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆124Updated 3 years ago
- Simple APPLocker bypass summary☆42Updated 6 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- ☆1Updated last year
- ☆92Updated 2 months ago