wunderwuzzi23 / ropciLinks
So, you think you have MFA? AAD/ROPC/MFA bypass testing tool
☆116Updated 2 years ago
Alternatives and similar repositories for ropci
Users that are interested in ropci are comparing it to the libraries listed below
Sorting:
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- ☆103Updated 2 years ago
- Hybrid AD utilities for ROADtools☆93Updated 4 months ago
- using graph proxy to monitor teams user presence☆54Updated last year
- ☆114Updated 4 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆134Updated 8 months ago
- ☆119Updated 3 months ago
- ☆179Updated 10 months ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆62Updated 7 months ago
- Modular Enumeration and Password Spraying Framework☆125Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- LDAP Querying without the Suck☆110Updated 10 months ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆87Updated 2 months ago
- Enumerate and check domains for Azure tenants☆60Updated 3 years ago
- Azure AD cheatsheet for the CARTP course☆132Updated 3 years ago
- ☆106Updated last year
- ☆86Updated 2 months ago
- ☆193Updated last month
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆73Updated 6 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆174Updated 2 weeks ago
- 🌩️ Collection of BloodHound queries for Azure☆77Updated 9 months ago
- tool for identifying guest relationships between companies☆103Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 10 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆44Updated 2 months ago
- pysnaffler☆104Updated last month