doredry / TokenFinder
Tool to extract powerful tokens from Office desktop apps memory
☆66Updated 6 months ago
Related projects: ⓘ
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆92Updated 10 months ago
- ☆99Updated last year
- ☆38Updated 5 months ago
- Collection of tools to use with Azure Applications☆107Updated 11 months ago
- ☆169Updated 7 months ago
- Efflanrs - GUI for Snaffler Output☆18Updated last week
- ☆21Updated this week
- ☆45Updated this week
- Default Detections for EDR☆94Updated 6 months ago
- ☆21Updated this week
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 2 years ago
- ☆34Updated 6 months ago
- ☆79Updated last year
- Azure AD cheatsheet for the CARTP course☆94Updated 2 years ago
- Automatically run and populate a new instance of BH CE☆41Updated 2 weeks ago
- Hybrid AD utilities for ROADtools☆59Updated last month
- ☆119Updated last month
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆12Updated 6 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆146Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆152Updated last year
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆91Updated last year
- ☆99Updated 3 years ago
- ☆33Updated 11 months ago
- DEFCON 31☆57Updated 2 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆119Updated last month
- Some scripts to support with importing large datasets into BloodHound☆75Updated 9 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆85Updated 6 months ago
- Microsoft Graph API post-exploitation toolkit☆90Updated 2 months ago
- ☆114Updated 2 months ago