f-bader / TokenTacticsV2
A fork of the great TokenTactics with support for CAE and token endpoint v2
☆198Updated last month
Related projects ⓘ
Alternatives and complementary repositories for TokenTacticsV2
- Abusing Intune for Lateral Movement over C2☆284Updated 3 weeks ago
- ☆173Updated 9 months ago
- ☆64Updated this week
- Identify the attack paths in BloodHound breaking your AD tiering☆310Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆190Updated this week
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆152Updated 2 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆134Updated 3 months ago
- Azure AD cheatsheet for the CARTP course☆98Updated 2 years ago
- ☆104Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆90Updated 8 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆91Updated 2 months ago
- ☆123Updated 4 months ago
- ☆129Updated last month
- User Enumeration of Microsoft Teams users via API☆120Updated 7 months ago
- ☆105Updated last year
- Azure DevOps Services Attack Toolkit☆137Updated 3 months ago
- Audit program for AzureAD☆145Updated last year
- Azure DevOps Services Attack Toolkit☆260Updated 3 months ago
- A tool for pointesters to find candies in SharePoint☆240Updated 2 years ago
- Some scripts to abuse kerberos using Powershell☆313Updated last year
- ☆98Updated 2 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆129Updated 2 months ago
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆112Updated this week
- Tool to extract powerful tokens from Office desktop apps memory☆67Updated 8 months ago
- Automatically run and populate a new instance of BH CE☆54Updated last month
- ☆47Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆163Updated last year
- Malware As A Service☆119Updated 8 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆225Updated 9 months ago
- Hybrid AD utilities for ROADtools☆63Updated this week