☆101Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for ROADtoken
Users that are interested in ROADtoken are comparing it to the libraries listed below
Sorting:
- ☆155Dec 14, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆95Mar 8, 2023Updated 3 years ago
- ☆30Aug 19, 2020Updated 5 years ago
- Tool to perform lateral movement between AAD joined devices☆66Jun 8, 2022Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- ☆64Jan 2, 2024Updated 2 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,551Feb 5, 2026Updated last month
- Azure JWT Token Manipulation Toolset☆720Dec 6, 2024Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Feb 5, 2023Updated 3 years ago
- BloodHound with a twist of cloud☆82Jul 28, 2020Updated 5 years ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆27Feb 11, 2023Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- ☆160Feb 8, 2025Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆105Jul 31, 2024Updated last year
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆342Feb 23, 2024Updated 2 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆785Aug 26, 2025Updated 6 months ago
- Beacon Object Files for roasting Active Directory☆236Feb 21, 2022Updated 4 years ago
- ☆117Jun 17, 2025Updated 9 months ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆21Sep 23, 2025Updated 5 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- ☆381Aug 7, 2023Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- ☆25Feb 9, 2022Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- ☆39Sep 26, 2022Updated 3 years ago
- C# version of MDSec's ParallelSyscalls☆142Jan 9, 2022Updated 4 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆107Jun 27, 2024Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- ☆22Jun 21, 2022Updated 3 years ago