Tamirye / Find-SensitiveAzStorageAccountsLinks
A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation and lateral movement
☆12Updated last year
Alternatives and similar repositories for Find-SensitiveAzStorageAccounts
Users that are interested in Find-SensitiveAzStorageAccounts are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Updated 8 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆44Updated 9 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 7 months ago
- Claude MCP server to perform analysis on ROADrecon data☆47Updated 7 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 11 months ago
- ☆34Updated 3 months ago
- ☆51Updated last year
- ☆20Updated last week
- ☆44Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆57Updated 3 months ago
- ☆40Updated 5 months ago
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆46Updated last month
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆16Updated last month
- Validates priv escalation of AD trusts☆48Updated 7 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- ☆40Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- ☆65Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆41Updated 11 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 11 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75Updated last year
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆55Updated 4 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆60Updated 4 months ago
- ☆19Updated 10 months ago
- Source code and examples for PassiveAggression☆64Updated last year
- ☆16Updated 5 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 6 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated last year