Research into Undocumented Behavior of Azure AD Refresh Tokens
☆13Oct 27, 2023Updated 2 years ago
Alternatives and similar repositories for family-of-client-ids-research
Users that are interested in family-of-client-ids-research are comparing it to the libraries listed below
Sorting:
- ☆18Feb 1, 2026Updated 3 weeks ago
- Demonstrates how to populate SID History on security principals migrated cross AD forest from PowerShell session☆15Feb 12, 2026Updated 2 weeks ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- ☆20May 1, 2023Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- A prototype for implementing Azure Service Principal Impersonation using Azure Functions and Key Vault. This project demonstrates an appr…☆17Feb 26, 2025Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆55Jul 13, 2025Updated 7 months ago
- ☆18Dec 9, 2023Updated 2 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 7 months ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 2 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- ☆28Aug 19, 2020Updated 5 years ago
- ☆33Jan 23, 2025Updated last year
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆50Jun 16, 2025Updated 8 months ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆55Sep 24, 2025Updated 5 months ago
- Tool for creating reports on Entra ID Role Assignments☆101Apr 12, 2024Updated last year
- ☆104Oct 27, 2022Updated 3 years ago
- Go implementation of an Extensible Storage Engine parser☆32Feb 15, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- ☆28Oct 11, 2025Updated 4 months ago
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 6 months ago
- ☆31Aug 23, 2020Updated 5 years ago
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- ☆146Nov 6, 2025Updated 3 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆88Mar 2, 2025Updated 11 months ago
- ☆137Feb 11, 2025Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆84Jan 7, 2025Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Async Python library to parse local and remote disk images.☆82Jul 11, 2025Updated 7 months ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆106Feb 16, 2026Updated last week
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year