szymex73 / ADFSpoofLinks
☆12Updated 2 years ago
Alternatives and similar repositories for ADFSpoof
Users that are interested in ADFSpoof are comparing it to the libraries listed below
Sorting:
- D/Invoke standalone shellcode runners☆39Updated 2 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆19Updated 3 years ago
- ☆27Updated 3 years ago
- ☆29Updated last year
- The DCERPC only printerbug.py version☆179Updated last month
- ☆88Updated 3 years ago
- ☆100Updated 9 months ago
- Tools I use on red team engagements and more☆33Updated last year
- Impacket pre-compiled binaries☆17Updated 2 years ago
- Rusty Impersonate☆102Updated last month
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆49Updated 4 months ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆161Updated last year
- Find .net assemblies locally☆127Updated 3 years ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆119Updated last month
- ☆28Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆96Updated last year
- ☆146Updated last year
- Payload Generation Framework☆96Updated last year
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Updated 10 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆127Updated 3 months ago
- AzureAD beacon object files☆134Updated 2 weeks ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆76Updated last week
- pysnaffler☆106Updated 3 months ago
- CLI tool to interact with the BloodHound CE API☆61Updated this week
- adws enumeration bof☆160Updated 2 months ago
- ForsHops☆150Updated 8 months ago
- ☆79Updated 10 months ago