msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified view on users across Entra ID and AD; allows to find the latest sign-in from both worlds and mark inactive users; reports on MFA methods and can support enforcement of MFA.
☆43Mar 13, 2025Updated 11 months ago
Alternatives and similar repositories for msuserstats
Users that are interested in msuserstats are comparing it to the libraries listed below
Sorting:
- A PowerShell wrapper for certutil.exe☆20Feb 21, 2026Updated last week
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆60Updated this week
- 😎 Awesome list of all things related to Microsoft Graph PowerShell☆14Apr 7, 2024Updated last year
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆29Feb 21, 2026Updated last week
- Automated Evilginx phishlet creator Extension for Burpsuite☆63Jan 10, 2025Updated last year
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 8 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆157Feb 19, 2026Updated last week
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- ☆38Feb 26, 2025Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆37Feb 6, 2026Updated 3 weeks ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Living off the land searches for explorer and sharepoint☆93Dec 7, 2025Updated 2 months ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆382Jan 23, 2025Updated last year
- Convenience tool for hashcat☆121Aug 26, 2025Updated 6 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- ☆44Jan 22, 2026Updated last month
- ☆65Mar 15, 2024Updated last year
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- Administrative Template (ADMX) for Microsoft Defender Attack Surface Reduction (ASR)☆14Jul 7, 2025Updated 7 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- This is a powershell module to help implement the AD Tier Model☆14Feb 17, 2026Updated last week
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆257Jan 23, 2026Updated last month
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated last month
- Go implementation of an Extensible Storage Engine parser☆32Feb 15, 2025Updated last year
- ☆91Updated this week
- ☆49Feb 12, 2026Updated 2 weeks ago
- To audit the security of read-only domain controllers☆118Nov 27, 2023Updated 2 years ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Nov 12, 2024Updated last year
- ConditionalAccessIQ streamlines this process by providing automatic version control, change tracking, and visual comparisons of your Cond…☆59Jun 30, 2025Updated 8 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- ☆13May 22, 2024Updated last year
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago