BloodHoundAD / Legacy-AzureHound.ps1
☆149Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Legacy-AzureHound.ps1
- AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic pic…☆187Updated 3 weeks ago
- Audit program for AzureAD☆145Updated last year
- A Powershell module that helps you identify AppLocker weaknesses☆162Updated 4 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆143Updated 3 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆144Updated 8 months ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆227Updated 2 years ago
- PoSh BloodHound Dog Whisperer☆187Updated last year
- Get insights into the actual strength and quality of passwords in Active Directory.☆151Updated 3 months ago
- Lateral Movement graph for Azure Active Directory☆122Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆307Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- ☆58Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆105Updated 3 years ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆137Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 2 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆234Updated 4 years ago
- ☆107Updated 5 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆107Updated 3 months ago
- ☆354Updated 2 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆216Updated 2 years ago
- Active Directory Lab for Penetration Testing☆49Updated 3 years ago
- ☆158Updated last year
- A PowerShell module to deploy active directory decoy objects.☆222Updated 4 years ago
- A curated list of awesome BloodhoundAD resources☆226Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆242Updated 6 months ago
- Microsoft Azure Exploitation Framework☆54Updated 3 years ago
- Python based BloodHound data importer☆144Updated last year
- Find exposed data in Azure with this public blob scanner☆314Updated 4 months ago
- Detect and abuse risky SPNs☆259Updated 7 years ago