xforcered / ADOKit
Azure DevOps Services Attack Toolkit
☆270Updated 7 months ago
Alternatives and similar repositories for ADOKit:
Users that are interested in ADOKit are comparing it to the libraries listed below
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆166Updated 6 months ago
- User Enumeration of Microsoft Teams users via API☆147Updated 11 months ago
- A BloodHound collector for Microsoft Configuration Manager☆307Updated 2 months ago
- Azure mindmap for penetration tests☆179Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆177Updated 10 months ago
- Azure Post Exploitation Framework☆186Updated last week
- A Red Team Activity Hub☆196Updated this week
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆252Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆282Updated 4 months ago
- Abusing Intune for Lateral Movement over C2☆327Updated last month
- Azure DevOps Services Attack Toolkit☆138Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆144Updated 3 months ago
- ☆177Updated 3 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆200Updated 2 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆266Updated 2 weeks ago
- ☆196Updated last month
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆142Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆220Updated 7 months ago
- Azure AD cheatsheet for the CARTP course☆108Updated 2 years ago
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆342Updated 2 months ago
- ☆189Updated 5 months ago
- ☆176Updated 3 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆259Updated last month
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆234Updated 11 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆178Updated 5 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆264Updated 7 months ago
- ☆284Updated last year