f-bader / TokenTacticsV2
A fork of the great TokenTactics with support for CAE and token endpoint v2
☆195Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for TokenTacticsV2
- Abusing Intune for Lateral Movement over C2☆266Updated last week
- ☆171Updated 9 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆189Updated this week
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆151Updated last month
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆91Updated 2 months ago
- Azure AD cheatsheet for the CARTP course☆96Updated 2 years ago
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆111Updated 6 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆223Updated 8 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆307Updated 2 years ago
- User Enumeration of Microsoft Teams users via API☆117Updated 7 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆89Updated 7 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆129Updated 2 months ago
- Azure DevOps Services Attack Toolkit☆125Updated 3 months ago
- ☆46Updated 7 months ago
- ☆104Updated last year
- ☆105Updated last year
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆532Updated 3 months ago
- Audit program for AzureAD☆145Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆107Updated 3 months ago
- Tool to extract powerful tokens from Office desktop apps memory☆67Updated 8 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆130Updated 3 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆99Updated 3 months ago
- Some scripts to abuse kerberos using Powershell☆312Updated last year
- ☆47Updated 11 months ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆98Updated last year
- Enumerate Microsoft Entra ID (Azure AD) fast☆86Updated 3 months ago
- ☆98Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆237Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆315Updated 5 months ago
- Automatically run and populate a new instance of BH CE☆48Updated 3 weeks ago