optiv / airCross
airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authentication attacks. airCross can locate AirWatch authentication endpoint, validate the authentication strategy of the environment, collect GroupID authentication values, conduct single-factor authentication, and perform…
☆43Updated 2 years ago
Alternatives and similar repositories for airCross:
Users that are interested in airCross are comparing it to the libraries listed below
- ☆37Updated 11 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- Exchangelib wrapper for pentesting☆62Updated last month
- ☆71Updated last year
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆29Updated 3 weeks ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆73Updated 4 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50Updated 2 years ago
- Get Fine Grained Password Policy☆68Updated 11 months ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆36Updated 4 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆30Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- ☆54Updated last year
- Modified version of PEAS client for offensive operations☆40Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Discord C2 Profile for Mythic☆28Updated last month
- My BloodHound custom queries☆23Updated 2 years ago
- ☆35Updated 3 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 6 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last week
- ☆43Updated 8 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 9 months ago
- Find Inbound Email Domains☆22Updated last year