SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.
☆22Nov 24, 2025Updated 3 months ago
Alternatives and similar repositories for Sato
Users that are interested in Sato are comparing it to the libraries listed below
Sorting:
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Python tool to automatically perform SPN-less RBCD attacks.☆123Jan 7, 2026Updated last month
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Jan 14, 2026Updated last month
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 3 months ago
- ☆54Jan 21, 2025Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- ☆40Oct 8, 2024Updated last year
- ☆38Mar 28, 2025Updated 11 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆42Jan 14, 2026Updated last month
- Test AMSI Provider implementation in C#☆42Dec 18, 2024Updated last year
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- ☆117Jun 17, 2025Updated 8 months ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆42Feb 22, 2026Updated last week
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆25Oct 13, 2025Updated 4 months ago
- ☆41Sep 9, 2023Updated 2 years ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆382Jan 23, 2025Updated last year
- ☆19Nov 28, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆50Feb 23, 2026Updated last week
- ☆18Apr 15, 2024Updated last year
- Collection of shellcode injection and execution techniques☆18Aug 21, 2025Updated 6 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆44Nov 29, 2024Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆145Feb 1, 2026Updated last month
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- ☆47Jan 31, 2024Updated 2 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- ☆26Aug 5, 2025Updated 7 months ago