0xJs / CARTP-cheatsheet
Azure AD cheatsheet for the CARTP course
☆94Updated 2 years ago
Related projects: ⓘ
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆39Updated 3 months ago
- ☆169Updated 7 months ago
- ☆95Updated 2 years ago
- AzureAD Pentest☆15Updated 2 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆68Updated 2 months ago
- Efflanrs - GUI for Snaffler Output☆18Updated last week
- A Azure Exploitation Toolkit for Red Team & Pentesters☆146Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆75Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆148Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆129Updated 10 months ago
- ☆111Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆294Updated last year
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆190Updated 9 months ago
- Make everyone in your VLAN ASRep roastable☆114Updated 3 months ago
- Custom Queries - Brought Up to BH4.1 syntax☆217Updated last year
- Modular Enumeration and Password Spraying Framework☆104Updated 5 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆119Updated last month
- ☆114Updated 2 months ago
- Material for the "Hands-On BloodHound" Workshop☆104Updated 3 years ago
- Inject remote template link into word document for remote template injection☆150Updated 3 years ago
- Collection of tools to use with Azure Applications☆107Updated 11 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆102Updated 4 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆74Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- ☆144Updated 7 months ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆144Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆92Updated 10 months ago
- A tool for pointesters to find candies in SharePoint☆228Updated last year
- ☆32Updated this week
- ☆110Updated last year