Azure pentesting reference for Altered Security Lab
☆25Jan 29, 2022Updated 4 years ago
Alternatives and similar repositories for Azure-AD
Users that are interested in Azure-AD are comparing it to the libraries listed below
Sorting:
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- ☆12Feb 20, 2022Updated 4 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- ☆15Jul 3, 2025Updated 8 months ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- A flexible tool that creates a minidump of the LSASS process☆14Jan 18, 2022Updated 4 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆20Apr 6, 2024Updated last year
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- ☆50Jun 4, 2025Updated 9 months ago
- ☆37Feb 12, 2018Updated 8 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Import python libraries over HTTP☆13Oct 28, 2024Updated last year
- ☆61Feb 10, 2022Updated 4 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 7 months ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ☆26Aug 5, 2025Updated 7 months ago
- ☆13Dec 29, 2020Updated 5 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 8 months ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated 2 weeks ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- USE THIS TOOL AGAINST SPAMMERS, THIS TOOL IS SO POWERFULL. ITS MAIN ABILITY IS CALL FLOODING.☆22Sep 13, 2020Updated 5 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆368Jun 24, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- Collection of scripts to extract Azure resource information to support security compliance audit.☆22Jan 18, 2022Updated 4 years ago
- AADInternals-Endpoints PowerShell module☆35Jul 2, 2025Updated 8 months ago
- generic CMP [RFC 9810, RFC 9483] client library and CLI, based on OpenSSL☆14Mar 12, 2026Updated last week