wunderwuzzi23 / ropciView external linksLinks
So, you think you have MFA? AAD/ROPC/MFA bypass testing tool
☆127Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for ropci
Users that are interested in ropci are comparing it to the libraries listed below
Sorting:
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆18Jun 20, 2025Updated 7 months ago
- Azure JWT Token Manipulation Toolset☆711Dec 6, 2024Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- ☆156Apr 17, 2024Updated last year
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆105Oct 27, 2022Updated 3 years ago
- ☆325Apr 17, 2023Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆277Nov 4, 2022Updated 3 years ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,030Dec 31, 2025Updated last month
- ☆156Dec 14, 2023Updated 2 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Jan 1, 2024Updated 2 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆50Jul 18, 2025Updated 6 months ago
- ☆122Oct 9, 2023Updated 2 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- Lockless BOF☆79May 2, 2025Updated 9 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,369Oct 22, 2025Updated 3 months ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆337Feb 23, 2024Updated last year
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,256Dec 9, 2025Updated 2 months ago
- Evasive Golang Loader☆137Jul 27, 2024Updated last year
- Click Once + App Domain☆64Dec 4, 2023Updated 2 years ago
- ☆28Oct 11, 2025Updated 4 months ago
- COFF file (BOF) for managing Kerberos tickets.☆321Jul 2, 2023Updated 2 years ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆271Apr 17, 2023Updated 2 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 5 months ago
- Dump Teams conversations☆19Jun 9, 2021Updated 4 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Feb 8, 2024Updated 2 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- ☆100Oct 7, 2023Updated 2 years ago
- ☆37May 8, 2022Updated 3 years ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30May 29, 2024Updated last year
- ☆193Dec 17, 2025Updated last month
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆272Sep 14, 2023Updated 2 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆385Updated this week
- Your syscall factory☆126Jan 13, 2026Updated last month