Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/secureworks/whiskeysamlandfriends
GoldenSAML Attack Libraries and Framework
https://github.com/secureworks/whiskeysamlandfriends
Last synced: 2 months ago
JSON representation
GoldenSAML Attack Libraries and Framework
- Host: GitHub
- URL: https://github.com/secureworks/whiskeysamlandfriends
- Owner: secureworks
- License: apache-2.0
- Created: 2021-11-04T15:30:12.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2024-06-05T14:56:28.000Z (7 months ago)
- Last Synced: 2024-06-06T17:13:54.824Z (7 months ago)
- Language: Python
- Size: 12.1 MB
- Stars: 63
- Watchers: 8
- Forks: 11
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - secureworks/whiskeysamlandfriends - GoldenSAML Attack Libraries and Framework (Python)
README
# WhiskeySAML and Friends
## TicketsPlease
[TicketsPlease](ticketsplease/): Python library to assist with the generation of Kerberos tickets, remote retrieval of ADFS configuration settings, generation of Golden SAML tokens, and retrieval of Azure Access Tokens.
## WhiskeySAML
[WhiskeySAML](whiskeysaml/): Proof of concept tool for a Golden SAML attack with Remote ADFS Configuration Extraction. This tool leverages the TicketsPlease library.
## ShockNAwe
[ShockNAwe](shocknawe/): Proof of concept tool to generate a Golden SAML token that will be used to request an Access Token from Azure Core Management which will then be used to enumerate and attack the virtual machines within the Azure subscription.
## DirectWave
[DirectWave](directwave/): Proof of concept tool to enumerate and execute commands on all Azure tenant Virual Machines when an Azure Core Management Access Token is supplied by the tool operator.