xforcered / ADOKit
Azure DevOps Services Attack Toolkit
☆259Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for ADOKit
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆174Updated 7 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆129Updated 2 months ago
- A Red Team Activity Hub☆175Updated this week
- ☆170Updated last month
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆246Updated last year
- ☆280Updated 11 months ago
- Azure mindmap for penetration tests☆161Updated last year
- ☆180Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆133Updated 3 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆229Updated 8 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆196Updated last week
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆133Updated last month
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆265Updated last week
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆332Updated 3 weeks ago
- Azure DevOps Services Attack Toolkit☆136Updated 3 months ago
- Retired TrustedSec Capabilities☆226Updated last month
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆131Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆163Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆158Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆89Updated this week
- An interactive shell to spoof some LOLBins command line☆180Updated 9 months ago
- A Slack bot phishing framework for Red Teaming exercises☆159Updated 6 months ago
- ☆267Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆248Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆222Updated 3 months ago
- ☆279Updated 3 weeks ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 6 months ago
- Abusing Intune for Lateral Movement over C2☆280Updated 2 weeks ago
- ☆173Updated 9 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆156Updated 3 weeks ago