doredry / TokenFinderLinks
Tool to extract powerful tokens from Office desktop apps memory
☆72Updated last year
Alternatives and similar repositories for TokenFinder
Users that are interested in TokenFinder are comparing it to the libraries listed below
Sorting:
- ☆105Updated 3 years ago
- ☆117Updated 4 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated last month
- ☆86Updated 3 years ago
- ☆107Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- DEFCON 31 slide deck and video link☆65Updated 6 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆93Updated 4 months ago
- ☆182Updated last year
- ☆111Updated 5 months ago
- Silver SAML forgery tool☆56Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- ☆33Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 9 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆90Updated 4 months ago
- 🌩️ Collection of BloodHound queries for Azure☆78Updated 10 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- GoldenSAML Attack Libraries and Framework☆75Updated last year
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆24Updated last year
- AAD related enumeration in Nim☆132Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 11 months ago
- ☆61Updated 2 years ago
- ☆110Updated 2 years ago
- Collection of tools to use with Azure Applications☆109Updated 2 years ago
- Abuse Azure API permissions for red teaming☆69Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- InfoSec Notes☆59Updated last year
- Scripts to enumerate and report on Entra Conditional Access☆39Updated 3 months ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆125Updated 3 years ago