secureworks / TokenMan
☆100Updated 2 years ago
Alternatives and similar repositories for TokenMan:
Users that are interested in TokenMan are comparing it to the libraries listed below
- Collection of tools to use with Azure Applications☆109Updated last year
- AAD related enumeration in Nim☆128Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- ☆83Updated this week
- ☆76Updated 11 months ago
- ☆51Updated 7 months ago
- ☆36Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆54Updated last month
- Hybrid AD utilities for ROADtools☆70Updated last month
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆87Updated 9 months ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated 8 months ago
- Efflanrs - GUI for Snaffler Output☆26Updated 6 months ago
- ☆54Updated last year
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Updated 4 months ago
- ☆82Updated 2 years ago
- ☆20Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆106Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 3 years ago
- ☆85Updated 4 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated last month
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Scripts to enumerate and report on Entra Conditional Access☆27Updated 6 months ago
- blame Huy☆42Updated 4 years ago
- Living off the land searches for explorer and sharepoint☆57Updated 4 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆120Updated 3 years ago
- ☆12Updated this week