Enumerate Microsoft Entra ID (Azure AD) fast
☆104Jan 26, 2026Updated last month
Alternatives and similar repositories for azurenum
Users that are interested in azurenum are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- ☆40Oct 8, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆108Nov 7, 2024Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Dec 5, 2025Updated 2 months ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Dec 7, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆314Mar 15, 2025Updated 11 months ago
- ☆37Jun 9, 2021Updated 4 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- ☆18May 14, 2025Updated 9 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆149Jun 5, 2025Updated 8 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆317Feb 8, 2026Updated 3 weeks ago
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago
- ☆57Jan 28, 2024Updated 2 years ago
- ☆84May 19, 2024Updated last year
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- ☆27May 6, 2024Updated last year
- ☆52Oct 29, 2024Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆236Aug 25, 2024Updated last year
- ☆107Jan 4, 2023Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21May 20, 2024Updated last year
- A Red Team Activity Hub☆235Feb 12, 2026Updated 2 weeks ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆54Jun 19, 2024Updated last year
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆40Jun 17, 2025Updated 8 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆25Apr 28, 2024Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago