AADInternals PowerShell module for administering Azure AD and Office 365
☆1,628Sep 30, 2025Updated 6 months ago
Alternatives and similar repositories for AADInternals
Users that are interested in AADInternals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,582Feb 5, 2026Updated 2 months ago
- A collection of scripts for assessing Microsoft Azure security☆2,342Mar 15, 2026Updated 3 weeks ago
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,646Updated this week
- Azure Data Exporter for BloodHound☆892Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PowerShell framework to assess Azure security☆1,266Oct 18, 2025Updated 5 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,376Mar 9, 2026Updated last month
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,082Mar 19, 2024Updated 2 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,696Jan 8, 2024Updated 2 years ago
- A C# utility for interacting with SCCM☆687Mar 30, 2026Updated last week
- Azure Security Resources and Notes☆1,730Feb 17, 2026Updated last month
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆784Aug 26, 2025Updated 7 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆749Jul 29, 2025Updated 8 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,270Mar 27, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,494Apr 3, 2026Updated last week
- Tooling for assessing an Azure AD tenant state and configuration☆839Jun 12, 2024Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,637Aug 6, 2022Updated 3 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆936Nov 11, 2024Updated last year
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆406Feb 9, 2026Updated 2 months ago
- BloodHound Attack Research Kit☆590Mar 18, 2025Updated last year
- Active Directory certificate abuse.☆1,947Mar 30, 2026Updated last week
- retrieve information via O365 and AzureAD with a valid cred☆739Aug 14, 2022Updated 3 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,451Feb 28, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Directory Services Internals (DSInternals) PowerShell Module and Framework☆1,923Mar 28, 2026Updated 2 weeks ago
- Framework for Kerberos relaying☆943May 29, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,068Mar 20, 2026Updated 3 weeks ago
- Tools for Kerberos PKINIT and relaying to AD CS☆891Jan 3, 2025Updated last year
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,262Mar 19, 2026Updated 3 weeks ago
- Trying to tame the three-headed dog.☆4,952Nov 14, 2025Updated 4 months ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆378Aug 7, 2020Updated 5 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆906Updated this week
- ☆382Aug 7, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- "Golden" certificates☆709Aug 17, 2024Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆345Feb 23, 2024Updated 2 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,564Mar 11, 2026Updated last month
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆890Apr 8, 2025Updated last year
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,773Feb 27, 2026Updated last month
- ☆1,676Apr 14, 2025Updated 11 months ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,209Aug 15, 2024Updated last year