Hagrid29 / AbuseAzureAPIPermissions
Abuse Azure API permissions for red teaming
☆64Updated 2 years ago
Alternatives and similar repositories for AbuseAzureAPIPermissions:
Users that are interested in AbuseAzureAPIPermissions are comparing it to the libraries listed below
- Lateral Movement☆122Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated 9 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆138Updated 8 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆86Updated 9 months ago
- Living off the land searches for explorer and sharepoint☆78Updated 5 months ago
- ☆79Updated 8 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 7 months ago
- A Python POC for CRED1 over SOCKS5☆146Updated 6 months ago
- Get Fine Grained Password Policy☆69Updated this week
- A small script that automates Entra ID persistence with Windows Hello For Business key☆56Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- ☆88Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆121Updated 3 years ago
- ☆71Updated last year
- Decrypt Veeam database passwords☆158Updated last year
- Azure DevOps Services Attack Toolkit☆141Updated last month
- ☆43Updated 9 months ago
- ☆56Updated 3 weeks ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Source code and examples for PassiveAggression☆55Updated 10 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- C# version of NTLMRawUnHide☆72Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 11 months ago
- AAD related enumeration in Nim☆129Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- ☆49Updated 5 months ago
- Adversary Emulation Framework☆96Updated 8 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago