xforcered / ADOKit
Azure DevOps Services Attack Toolkit
☆259Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for ADOKit
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆174Updated 6 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆129Updated 2 months ago
- Azure DevOps Services Attack Toolkit☆125Updated 3 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆147Updated last year
- A Red Team Activity Hub☆171Updated this week
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆262Updated this week
- ☆180Updated last month
- ☆281Updated 11 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆130Updated last year
- Azure mindmap for penetration tests☆161Updated 11 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆130Updated 3 months ago
- ☆171Updated 9 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆245Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆218Updated 3 months ago
- ☆169Updated last month
- Abusing Intune for Lateral Movement over C2☆266Updated last week
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆122Updated last month
- Everything and anything related to password spraying☆126Updated 5 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆315Updated 5 months ago
- User Enumeration of Microsoft Teams users via API☆117Updated 7 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆228Updated 7 months ago
- Retired TrustedSec Capabilities☆225Updated last month
- ☆265Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆89Updated 7 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆383Updated 3 months ago
- Some scripts to abuse kerberos using Powershell☆312Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆332Updated 2 weeks ago
- ☆134Updated 3 weeks ago
- ☆275Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago