szymex73 / ADFSpoofLinks
☆12Updated 2 years ago
Alternatives and similar repositories for ADFSpoof
Users that are interested in ADFSpoof are comparing it to the libraries listed below
Sorting:
- ☆88Updated 2 years ago
- Impacket pre-compiled binaries☆16Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆48Updated 6 months ago
- ☆29Updated 9 months ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Updated last year
- Simple BOF to read the protection level of a process☆115Updated 2 years ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆21Updated 3 years ago
- ☆71Updated last week
- D/Invoke standalone shellcode runners☆39Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 11 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆40Updated 4 months ago
- Get Fine Grained Password Policy☆70Updated 2 months ago
- tool for requesting Entra ID's P2P certificate and authenticating remote Entra joinned devices with it☆70Updated last week
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆42Updated 2 months ago
- ☆61Updated 5 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆82Updated 9 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- Rusty Impersonate☆97Updated 2 years ago
- a port of privkit bof for havoc☆23Updated last year
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆63Updated 5 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated 3 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆39Updated last year
- Random☆33Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆37Updated this week