wunderwuzzi23 / ropciLinks
So, you think you have MFA? AAD/ROPC/MFA bypass testing tool
☆127Updated 3 years ago
Alternatives and similar repositories for ropci
Users that are interested in ropci are comparing it to the libraries listed below
Sorting:
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Updated 2 years ago
- ☆120Updated 4 years ago
- Hybrid AD utilities for ROADtools☆106Updated 8 months ago
- ☆105Updated 3 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 11 months ago
- ☆184Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Updated last year
- Collection of tools to use with Azure Applications☆112Updated 2 years ago
- ☆193Updated last month
- Abuse Azure API permissions for red teaming☆71Updated 3 years ago
- Azure DevOps Services Attack Toolkit☆150Updated 10 months ago
- AAD related enumeration in Nim☆132Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- using graph proxy to monitor teams user presence☆55Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆82Updated last year
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆129Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆79Updated 10 months ago
- ☆197Updated 5 months ago
- Enumerate and check domains for Azure tenants☆60Updated 4 years ago
- LDAP Querying without the Suck☆110Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆73Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Updated 6 months ago
- ☆107Updated 3 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆191Updated 3 years ago
- ☆36Updated 2 years ago