h4wkst3r / ADOKitLinks
Azure DevOps Services Attack Toolkit
☆145Updated 3 months ago
Alternatives and similar repositories for ADOKit
Users that are interested in ADOKit are comparing it to the libraries listed below
Sorting:
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆176Updated 10 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆122Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated 9 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆75Updated last week
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 11 months ago
- Hybrid AD utilities for ROADtools☆80Updated last month
- ☆82Updated 10 months ago
- Living off the land searches for explorer and sharepoint☆86Updated last month
- ☆37Updated last year
- ☆106Updated 2 years ago
- ☆118Updated 2 months ago
- Tools for attacking Azure Function Apps☆82Updated 7 months ago
- AAD related enumeration in Nim☆129Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆57Updated 4 months ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆119Updated 3 years ago
- Lateral Movement☆124Updated last year
- A Python POC for CRED1 over SOCKS5☆149Updated 8 months ago
- ☆91Updated 2 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 11 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆72Updated 5 months ago
- ☆160Updated 7 months ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- ☆151Updated 4 months ago
- Automatically run and populate a new instance of BH CE☆91Updated last month
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- ☆178Updated 6 months ago