optiv / airCrossLinks
airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authentication attacks. airCross can locate AirWatch authentication endpoint, validate the authentication strategy of the environment, collect GroupID authentication values, conduct single-factor authentication, and perform…
☆48Updated 3 years ago
Alternatives and similar repositories for airCross
Users that are interested in airCross are comparing it to the libraries listed below
Sorting:
- Federated Office365 user enumeration based on correlated response trend analysis☆50Updated 3 years ago
- ☆74Updated 7 months ago
- Exchangelib wrapper for pentesting☆67Updated 11 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 10 months ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Modified version of PEAS client for offensive operations☆42Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated last month
- Tool to perform lateral movement between AAD joined devices☆66Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆92Updated last year
- Get Fine Grained Password Policy☆77Updated 9 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Updated 2 years ago
- Hiding your infrastructure from the boys in blue.☆23Updated 4 years ago
- Yet Another LinkedIn Scraper☆33Updated 2 years ago
- My BloodHound custom queries☆26Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- ☆53Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Updated 9 months ago
- ☆121Updated 3 years ago
- ☆39Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated last year
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Updated 3 years ago
- ☆40Updated last year