A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objects, risky assignments, and potential misconfigurations.
☆315Feb 8, 2026Updated 2 weeks ago
Alternatives and similar repositories for EntraFalcon
Users that are interested in EntraFalcon are comparing it to the libraries listed below
Sorting:
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,238Feb 4, 2026Updated 3 weeks ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Jul 13, 2025Updated 7 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆381Jan 23, 2025Updated last year
- Addon for BHCE☆58Apr 1, 2025Updated 10 months ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- ☆283Aug 14, 2025Updated 6 months ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38May 17, 2025Updated 9 months ago
- BloodHound Attack Research Kit☆586Mar 18, 2025Updated 11 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆575Dec 6, 2025Updated 2 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,032Dec 31, 2025Updated last month
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 7 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 9 months ago
- Persist like a Dodder☆68May 19, 2025Updated 9 months ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,472Feb 18, 2026Updated last week
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆191Feb 17, 2026Updated last week
- ☆619Feb 5, 2026Updated 3 weeks ago
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆131Jan 27, 2026Updated last month
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆357Jan 8, 2026Updated last month
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- ☆766May 7, 2025Updated 9 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Dec 7, 2024Updated last year
- ScriptSentry finds misconfigured and dangerous logon scripts.☆624Feb 16, 2026Updated last week
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Enumerate Microsoft Entra ID (Azure AD) fast☆104Jan 26, 2026Updated last month
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆214Jan 12, 2026Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 5 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Jul 19, 2025Updated 7 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆119Jun 10, 2025Updated 8 months ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆1,096Feb 20, 2026Updated last week
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆187Sep 19, 2025Updated 5 months ago