wunderwuzzi23 / ropciLinks
So, you think you have MFA? AAD/ROPC/MFA bypass testing tool
☆126Updated 3 years ago
Alternatives and similar repositories for ropci
Users that are interested in ropci are comparing it to the libraries listed below
Sorting:
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- Hybrid AD utilities for ROADtools☆102Updated 7 months ago
- ☆119Updated 4 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Updated last year
- using graph proxy to monitor teams user presence☆55Updated last year
- ☆105Updated 3 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 10 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆141Updated 3 years ago
- ☆105Updated 2 years ago
- Azure DevOps Services Attack Toolkit☆150Updated 9 months ago
- ☆197Updated 4 months ago
- 🌩️ Collection of BloodHound queries for Azure☆81Updated 11 months ago
- ☆182Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258Updated 3 years ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆140Updated 11 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆162Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- ☆177Updated last week
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆72Updated last year
- Modular Enumeration and Password Spraying Framework☆128Updated last year
- AAD related enumeration in Nim☆133Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆90Updated 5 months ago
- Collection of tools to use with Azure Applications☆112Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆92Updated 3 weeks ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Updated last year