Microsoft Entra ID (Azure AD) Unauthenticated Enumeration
☆69Feb 5, 2026Updated last month
Alternatives and similar repositories for AzureADEnumeration
Users that are interested in AzureADEnumeration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆43Jan 18, 2026Updated 2 months ago
- ClickForClickOnce - Generate configurable clickonce payloads☆92Oct 10, 2025Updated 5 months ago
- DRILL (Distributable Remote Integrated Lightweight Link) is a powerful and stealthy Command and Control (C2) framework designed for seaml…☆34Jul 31, 2025Updated 7 months ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated last week
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- Python based GUI for browsing LDAP☆182Dec 7, 2025Updated 3 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- dcsync bof☆46Feb 13, 2026Updated last month
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 7 months ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- List web account manager (WAM) accounts added to the current profile☆24Dec 11, 2025Updated 3 months ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆96Jan 27, 2026Updated last month
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆36Dec 18, 2025Updated 3 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆67Feb 17, 2026Updated last month
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 3 weeks ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- A fast, deterministic, non-cryptographic hash for use in hash tables for Rust☆15Jan 12, 2021Updated 5 years ago
- Open KLara Project☆36Feb 12, 2026Updated last month
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Updated this week
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 2 months ago
- Asynchronous NFSv3 client in pure Python☆29Jul 16, 2025Updated 8 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆508Oct 3, 2025Updated 5 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Hackers Cookbook - Tons of hacker cli recipes ready to search and use when you need them☆42Mar 12, 2026Updated last week
- Bof of RegPwn by MDSec☆72Mar 15, 2026Updated last week
- A Beacon Object File (BOF) implementation of the 'cat' command☆27Feb 11, 2023Updated 3 years ago