Table of AD and Azure assets and whether they belong to Tier Zero
☆26Sep 12, 2023Updated 2 years ago
Alternatives and similar repositories for TierZeroTable
Users that are interested in TierZeroTable are comparing it to the libraries listed below
Sorting:
- ☆26Apr 1, 2022Updated 3 years ago
- ☆185Dec 4, 2024Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- Implement a powerful Tiering Security Model in Microsoft Entra for your Cloud Administrator identities using Azure Automation.☆51Mar 11, 2026Updated last week
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆67Feb 16, 2025Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆43Jul 18, 2024Updated last year
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Azure AD Identity Protection Cookie Spoofing☆36Sep 2, 2023Updated 2 years ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year
- ☆12Oct 24, 2022Updated 3 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- ☆13Oct 21, 2023Updated 2 years ago
- BloodHound Attack Research Kit☆586Mar 18, 2025Updated last year
- ☆30Aug 19, 2020Updated 5 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A small go tool to upload JSON files to the BloodHound community edition API☆31May 29, 2024Updated last year
- A Python based ingestor for BloodHound☆85Sep 26, 2022Updated 3 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- Azure administrative tiering based on known attack paths☆134Mar 14, 2026Updated last week
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆56Jul 13, 2025Updated 8 months ago
- ☆234Oct 8, 2024Updated last year
- x64 version☆36Oct 8, 2021Updated 4 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆398Feb 9, 2026Updated last month
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆181Aug 16, 2025Updated 7 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago