dirkjanm / ROADtoken
☆89Updated 4 years ago
Alternatives and similar repositories for ROADtoken:
Users that are interested in ROADtoken are comparing it to the libraries listed below
- Material for the "Hands-On BloodHound" Workshop☆108Updated 3 years ago
- ☆136Updated last year
- GolenGMSA tool for working with GMSA passwords☆145Updated last year
- ☆151Updated 2 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- Collection of tools to use with Azure Applications☆108Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆90Updated 11 months ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- ☆88Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆113Updated 2 years ago
- ☆117Updated 3 years ago
- ☆79Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆37Updated last year
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆232Updated 2 years ago
- ☆100Updated 2 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated 10 months ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆220Updated 4 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- Python based BloodHound data importer☆147Updated last year
- ☆159Updated 5 months ago
- Updated last year
- Simple APPLocker bypass summary☆41Updated 6 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆126Updated 3 years ago
- Tool to perform lateral movement between AAD joined devices☆60Updated 2 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆121Updated 3 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆52Updated 10 months ago