Hagrid29 / AbuseAzureAPIPermissions
Abuse Azure API permissions for red teaming
☆58Updated last year
Related projects ⓘ
Alternatives and complementary repositories for AbuseAzureAPIPermissions
- Lateral Movement☆118Updated 11 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆89Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆76Updated last month
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆57Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆83Updated 4 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆75Updated 6 months ago
- ☆66Updated 3 months ago
- ☆83Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆62Updated last year
- ☆43Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆80Updated 4 months ago
- Microsoft Graph API post-exploitation toolkit☆93Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆42Updated 3 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆69Updated 9 months ago
- ☆91Updated 8 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆132Updated 3 months ago
- Slide decks and/or materials from conference presentations☆54Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- To audit the security of read-only domain controllers☆113Updated 11 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- C# version of NTLMRawUnHide☆72Updated 2 years ago
- ☆68Updated last year
- ☆63Updated 7 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆130Updated last month
- ☆33Updated 3 weeks ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆47Updated 3 months ago
- Python module for running BOFs☆64Updated last year