A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objects, risky assignments, and potential misconfigurations.
☆319Feb 8, 2026Updated last month
Alternatives and similar repositories for EntraFalcon
Users that are interested in EntraFalcon are comparing it to the libraries listed below
Sorting:
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,244Mar 11, 2026Updated last week
- Abusing Azure services over C2☆367Jan 20, 2026Updated last month
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆385Jan 23, 2025Updated last year
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆578Dec 6, 2025Updated 3 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆168Nov 17, 2025Updated 4 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- ☆287Aug 14, 2025Updated 7 months ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38May 17, 2025Updated 10 months ago
- BloodHound Attack Research Kit☆586Mar 18, 2025Updated last year
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,175Dec 31, 2025Updated 2 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆166Dec 7, 2024Updated last year
- ☆41Sep 5, 2025Updated 6 months ago
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆132Jan 27, 2026Updated last month
- Enumerate Microsoft Entra ID (Azure AD) fast☆112Jan 26, 2026Updated last month
- ☆773May 7, 2025Updated 10 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 7 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,488Feb 18, 2026Updated last month
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆197Updated this week
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆360Jan 8, 2026Updated 2 months ago
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago
- ☆41Sep 9, 2023Updated 2 years ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆398Jul 23, 2025Updated 7 months ago
- ☆623Feb 5, 2026Updated last month
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- ScriptSentry finds misconfigured and dangerous logon scripts.☆626Feb 16, 2026Updated last month
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,542Feb 5, 2026Updated last month
- ☆163Nov 19, 2025Updated 4 months ago
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆1,103Feb 20, 2026Updated 3 weeks ago
- Halberd : Multi-Cloud Agentic Attack Tool☆335Jan 12, 2026Updated 2 months ago
- ☆18Updated this week
- Maester is a PowerShell based test automation framework to help you stay in control of your Microsoft security configuration.☆805Updated this week
- PowerShell module to export a local copy of an Entra (Azure AD) tenant configuration.☆835Nov 16, 2025Updated 4 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 10 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago