☆155Dec 14, 2023Updated 2 years ago
Alternatives and similar repositories for RequestAADRefreshToken
Users that are interested in RequestAADRefreshToken are comparing it to the libraries listed below
Sorting:
- ☆100Sep 30, 2020Updated 5 years ago
- ☆159Apr 17, 2024Updated last year
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆393Feb 9, 2026Updated 2 weeks ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Azure JWT Token Manipulation Toolset☆714Dec 6, 2024Updated last year
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Jan 14, 2023Updated 3 years ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- ☆200Dec 17, 2025Updated 2 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- ☆142May 4, 2022Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆303Dec 30, 2021Updated 4 years ago
- ☆415Apr 28, 2021Updated 4 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆123Jan 17, 2026Updated last month
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 2 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- ☆263Apr 10, 2023Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- ☆65Jan 2, 2024Updated 2 years ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- Collection of tools to use with Azure Applications☆112Oct 13, 2023Updated 2 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Feb 10, 2023Updated 3 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- Lockless allows for the copying of locked files.☆253Apr 30, 2021Updated 4 years ago
- ☆104Oct 27, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- Framework for Kerberos relaying☆937May 29, 2022Updated 3 years ago
- Tools for interacting with authentication packages using their individual message protocols☆403Feb 1, 2026Updated last month
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆413May 29, 2024Updated last year
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- ☆121Nov 21, 2024Updated last year