Hagrid29 / AbuseAzureAPIPermissions
Abuse Azure API permissions for red teaming
☆61Updated 2 years ago
Alternatives and similar repositories for AbuseAzureAPIPermissions:
Users that are interested in AbuseAzureAPIPermissions are comparing it to the libraries listed below
- Lateral Movement☆123Updated last year
- ☆78Updated 7 months ago
- A Python POC for CRED1 over SOCKS5☆144Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 8 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆137Updated 7 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated 8 months ago
- Active Directory Authentication Library☆60Updated last week
- ☆71Updated last year
- Get Fine Grained Password Policy☆68Updated 10 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆23Updated 2 months ago
- ☆116Updated last year
- ☆87Updated 2 years ago
- ☆43Updated 8 months ago
- Adversary Emulation Framework☆92Updated 8 months ago
- Deploy a phishing infrastructure on the fly.☆68Updated 3 months ago
- ☆49Updated last month
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆121Updated 3 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- ☆54Updated last month
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆110Updated 11 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 3 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆79Updated 6 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆117Updated last month
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆32Updated 4 months ago
- Azure DevOps Services Attack Toolkit☆140Updated last week
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆81Updated 6 months ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago