GoldenSAML Attack Libraries and Framework
☆77Jun 5, 2024Updated last year
Alternatives and similar repositories for whiskeysamlandfriends
Users that are interested in whiskeysamlandfriends are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WordPress version identification and vulnerability finder.☆32Apr 21, 2026Updated last month
- Carbon Black TAU Excel 4 Macro Analysis☆44Feb 8, 2024Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆89Jan 11, 2024Updated 2 years ago
- Fast http dead file finder.☆218Jul 11, 2025Updated 10 months ago
- ☆412Apr 21, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆23Nov 13, 2021Updated 4 years ago
- ☆383Aug 7, 2023Updated 2 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆277Jan 28, 2025Updated last year
- "Golden" certificates☆717Aug 17, 2024Updated last year
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆27Dec 1, 2022Updated 3 years ago
- ☆35Apr 5, 2017Updated 9 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆180Oct 21, 2018Updated 7 years ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆209Feb 24, 2022Updated 4 years ago
- ☆120Jun 2, 2021Updated 4 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆33Jan 22, 2026Updated 3 months ago
- ☆15Mar 18, 2025Updated last year
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆193Jul 7, 2021Updated 4 years ago
- ☆163Feb 8, 2025Updated last year
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- PoC☆12Apr 7, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- OPSEC safe Kerberoasting in C#☆199Jun 14, 2022Updated 3 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- ADCS abuser☆321Feb 6, 2023Updated 3 years ago
- Industrial Control Systems Network Protocol Parsers☆196Mar 10, 2026Updated 2 months ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Dec 2, 2021Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆875Mar 20, 2023Updated 3 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22May 21, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Python script to find tenant id an region from a list of domain names.☆21Jan 31, 2025Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103May 4, 2019Updated 7 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆388Dec 23, 2025Updated 4 months ago
- ☆203May 14, 2026Updated last week
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆354Feb 23, 2024Updated 2 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆91Feb 16, 2022Updated 4 years ago
- A tool that implements the Golden SAML attack☆343Oct 15, 2018Updated 7 years ago