Hagrid29 / AbuseAzureAPIPermissionsLinks
Abuse Azure API permissions for red teaming
☆69Updated 2 years ago
Alternatives and similar repositories for AbuseAzureAPIPermissions
Users that are interested in AbuseAzureAPIPermissions are comparing it to the libraries listed below
Sorting:
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- AAD related enumeration in Nim☆133Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆93Updated 2 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 10 months ago
- Azure DevOps Services Attack Toolkit☆150Updated 9 months ago
- ☆36Updated 2 years ago
- Lateral Movement☆125Updated 2 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆92Updated last month
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆81Updated last year
- Decrypt Veeam database passwords☆213Updated 3 weeks ago
- Living off the land searches for explorer and sharepoint☆92Updated 3 weeks ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75Updated last year
- ☆120Updated 9 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Get Fine Grained Password Policy☆78Updated 8 months ago
- ☆44Updated last year
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆129Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Updated 2 years ago
- ☆74Updated 6 months ago
- Source code and examples for PassiveAggression☆64Updated last year
- Automated exploitation of MSSQL servers at scale☆128Updated last month
- My BloodHound custom queries☆26Updated 2 years ago
- SCEP request tool for AD CS and Intune☆74Updated 2 months ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- BloodHound PowerShell client☆75Updated 2 weeks ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆92Updated last year
- ☆86Updated 3 years ago