dirkjanm / ROADtokenLinks
☆92Updated 4 years ago
Alternatives and similar repositories for ROADtoken
Users that are interested in ROADtoken are comparing it to the libraries listed below
Sorting:
- ☆144Updated last year
- ☆151Updated 3 months ago
- GolenGMSA tool for working with GMSA passwords☆150Updated last year
- Collection of tools to use with Azure Applications☆108Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- ☆100Updated 2 years ago
- ☆79Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆93Updated last year
- Hybrid AD utilities for ROADtools☆74Updated last week
- ☆159Updated 6 months ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆116Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- AAD related enumeration in Nim☆129Updated last year
- OPSEC safe Kerberoasting in C#☆192Updated 2 years ago
- ☆70Updated 4 years ago
- ☆88Updated 2 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆100Updated 11 months ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆122Updated 3 years ago
- Python based BloodHound data importer☆147Updated last year
- ☆247Updated last year
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆233Updated 2 years ago
- SpecterOps Presentations☆200Updated last month
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆320Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆193Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆127Updated 3 years ago