☆155Dec 14, 2023Updated 2 years ago
Alternatives and similar repositories for RequestAADRefreshToken
Users that are interested in RequestAADRefreshToken are comparing it to the libraries listed below
Sorting:
- ☆101Sep 30, 2020Updated 5 years ago
- ☆160Apr 17, 2024Updated last year
- Azure JWT Token Manipulation Toolset☆720Dec 6, 2024Updated last year
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆398Feb 9, 2026Updated last month
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated 2 months ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆168Nov 17, 2025Updated 4 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- ☆215Dec 17, 2025Updated 3 months ago
- Hybrid AD utilities for ROADtools☆108May 25, 2025Updated 9 months ago
- ☆418Apr 28, 2021Updated 4 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- ☆263Apr 10, 2023Updated 2 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- COFF file (BOF) for managing Kerberos tickets.☆320Jul 2, 2023Updated 2 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- Tools for interacting with authentication packages using their individual message protocols☆419Mar 1, 2026Updated 3 weeks ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Updated this week
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,551Feb 5, 2026Updated last month
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 2 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- Framework for Kerberos relaying☆938May 29, 2022Updated 3 years ago
- NTLM relaying for Windows made easy☆581Apr 25, 2023Updated 2 years ago
- ☆142May 4, 2022Updated 3 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆162Mar 1, 2024Updated 2 years ago
- Remote operations commands implemented using Beacon Object Files☆1,139Mar 5, 2026Updated 2 weeks ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- tgtdelegation is a Beacon Object File (BOF) to obtain a usable TGT via the "TGT delegation trick"☆178Nov 26, 2021Updated 4 years ago
- Lockless allows for the copying of locked files.☆254Apr 30, 2021Updated 4 years ago
- ☆101Aug 23, 2021Updated 4 years ago