TokenSmith is a powerful tool designed to generate Entra ID access and refresh tokens, catering to offensive engagements such as adversary simulations, penetration testing, or even administrative tasks.
Built with operational security (OpSec) in mind, TokenSmith is compatible with popular Azure offensive tools and provides flexibility for various use cases.
--intune-bypass
flag.TokenSmith can be installed by building it from source or using pre-built binaries available in its release directory. To build from source:
git clone https://github.com/jumpseclabs/tokensmith.git
cd tokensmith
go get .
go build -o tokensmith main.go
For Windows, use GOOS=windows go build -o tokensmith.exe main.go
.
Authorization Code Flow
./tokensmith authcode
with optional flags for client ID, resource, or redirect URI.Intune Bypass
To bypass Intune Conditional Access, add the --intune-bypass
flag to the authcode
command.
Refresh Token Flow
Use an existing refresh token to obtain new tokens:
./tokensmith reftoken -r REFRESH_TOKEN [flags]
TokenSmith prioritizes OpSec by enabling flexible authentication methods without requiring risky binary execution on critical devices. Authentication can occur on a separate device, minimizing exposure.
Future updates aim to include:
TokenSmith is an indispensable tool for professionals seeking efficient Entra ID token management while maintaining robust OpSec practices.
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…