So, you think you have MFA? AAD/ROPC/MFA bypass testing tool
☆126Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for ropci
Users that are interested in ropci are comparing it to the libraries listed below
Sorting:
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Azure JWT Token Manipulation Toolset☆718Dec 6, 2024Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- ☆155Dec 14, 2023Updated 2 years ago
- ☆329Apr 17, 2023Updated 2 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 8 months ago
- ☆158Apr 17, 2024Updated last year
- ☆37May 8, 2022Updated 3 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆102Oct 27, 2022Updated 3 years ago
- A tool for pointesters to find candies in SharePoint☆281Nov 4, 2022Updated 3 years ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,035Dec 31, 2025Updated 2 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 3 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Jan 1, 2024Updated 2 years ago
- ☆123Oct 9, 2023Updated 2 years ago
- Lockless BOF☆79May 2, 2025Updated 10 months ago
- ☆88Jul 28, 2022Updated 3 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆52Jul 18, 2025Updated 7 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,371Oct 22, 2025Updated 4 months ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- COFF file (BOF) for managing Kerberos tickets.☆320Jul 2, 2023Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆341Feb 23, 2024Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,266Dec 9, 2025Updated 3 months ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Jan 27, 2024Updated 2 years ago
- Evasive Golang Loader☆137Jul 27, 2024Updated last year
- Click Once + App Domain☆67Feb 23, 2026Updated 2 weeks ago
- ☆28Oct 11, 2025Updated 4 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆31May 29, 2024Updated last year
- New lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking code execution.☆301Feb 23, 2022Updated 4 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆276Apr 17, 2023Updated 2 years ago
- ☆101Oct 7, 2023Updated 2 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆394Feb 9, 2026Updated last month