ZarvisD / Azure-AD
Azure pentesting reference for Altered Security Lab
☆24Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Azure-AD
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- ☆15Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Find Inbound Email Domains☆21Updated 11 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆30Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆11Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆31Updated 2 weeks ago
- ☆30Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆77Updated 11 months ago
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆13Updated 5 years ago
- CIS Benchmark testing of Windows SIEM configuration☆43Updated last year
- ☆25Updated last year
- You can check below blog post on attacks related to azure storage.☆13Updated 3 years ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆25Updated 3 months ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆30Updated last year
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 7 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- Hiding your infrastructure from the boys in blue.☆20Updated 3 years ago