doredry / TokenFinder
Tool to extract powerful tokens from Office desktop apps memory
☆71Updated last year
Alternatives and similar repositories for TokenFinder:
Users that are interested in TokenFinder are comparing it to the libraries listed below
- ☆100Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- ☆88Updated last week
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆79Updated last year
- Collection of tools to use with Azure Applications☆108Updated last year
- ☆178Updated 4 months ago
- 🌩️ Collection of BloodHound queries for Azure☆63Updated 3 months ago
- ☆55Updated last year
- ☆46Updated last year
- Hybrid AD utilities for ROADtools☆72Updated 2 months ago
- AAD related enumeration in Nim☆129Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆56Updated 2 months ago
- Abuse Azure API permissions for red teaming☆64Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- ☆82Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated 2 years ago
- ☆106Updated 2 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 7 months ago
- Azure AD cheatsheet for the CARTP course☆111Updated 2 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆31Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆68Updated 4 months ago
- blame Huy☆42Updated 4 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆109Updated 2 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆38Updated 11 months ago
- Living off the land searches for explorer and sharepoint☆78Updated 5 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆37Updated last year
- ☆142Updated 3 weeks ago