Tool to perform lateral movement between AAD joined devices
☆65Jun 8, 2022Updated 3 years ago
Alternatives and similar repositories for AzureADJoinedMachinePTC
Users that are interested in AzureADJoinedMachinePTC are comparing it to the libraries listed below
Sorting:
- ☆28Aug 19, 2020Updated 5 years ago
- Collection of tools to use with Azure Applications☆112Oct 13, 2023Updated 2 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- ☆39Oct 12, 2022Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Jan 14, 2023Updated 3 years ago
- ☆100Sep 30, 2020Updated 5 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- ☆155Dec 14, 2023Updated 2 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆121Sep 14, 2021Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆567Jun 27, 2025Updated 8 months ago
- ☆53Oct 20, 2020Updated 5 years ago
- Spray a hash via smb to check for local administrator access☆142Feb 7, 2021Updated 5 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- ☆152Jan 6, 2023Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆714Dec 6, 2024Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Aug 23, 2025Updated 6 months ago
- C# Implementation of the Hell's Gate VX Technique☆216Jun 30, 2020Updated 5 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆233Jun 17, 2022Updated 3 years ago
- Beacon Object File & C# project to check LDAP signing☆199Aug 7, 2024Updated last year
- Beacon Object File (BOF) for remote process injection via thread hijacking☆220Jan 13, 2021Updated 5 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆143Sep 24, 2021Updated 4 years ago
- ☆113Oct 10, 2022Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆81Mar 30, 2023Updated 2 years ago
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 4 years ago
- ☆94May 14, 2022Updated 3 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆11Jun 9, 2020Updated 5 years ago