Logisek / AzureADEnumerationLinks
Microsoft Entra ID (Azure AD) Unauthenticated Enumeration
☆46Updated this week
Alternatives and similar repositories for AzureADEnumeration
Users that are interested in AzureADEnumeration are comparing it to the libraries listed below
Sorting:
- ☆57Updated 11 months ago
- ☆159Updated 9 months ago
- ☆161Updated 3 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Updated last week
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Updated 3 weeks ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Updated last year
- Permanently disable EDRs as local admin☆125Updated last month
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Updated 3 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Updated 9 months ago
- Microsoft Network Service Fingerprinting Tool☆67Updated last month
- A C# utility for interacting with SCOM☆95Updated 2 months ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆50Updated 7 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Updated 7 months ago
- Your Skyfall Infrastructure Pack☆90Updated 2 weeks ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆97Updated last month
- ☆50Updated 10 months ago
- SCEP request tool for AD CS and Intune☆73Updated 3 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Updated 3 months ago
- Dump Kerberos tickets☆44Updated 6 months ago
- Proof of concept for Kerberos Armoring abuse.☆78Updated last month
- Advanced In-Memory PowerShell Process Injection Framework☆72Updated 6 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Updated last week
- Living off the land searches for explorer and sharepoint☆92Updated 2 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- ☆52Updated last year
- Dump processes over WMI with MSFT_MTProcess☆81Updated 4 months ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆205Updated last month
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Updated 2 years ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆148Updated 2 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 8 months ago