adrecon / AzureADReconLinks
AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic picture of the current state of the target environment.
☆204Updated 6 months ago
Alternatives and similar repositories for AzureADRecon
Users that are interested in AzureADRecon are comparing it to the libraries listed below
Sorting:
- Get insights into the actual strength and quality of passwords in Active Directory.☆155Updated last year
- ☆150Updated 4 years ago
- Audit program for AzureAD☆150Updated 2 years ago
- A PowerShell script that automates the security assessment of Microsoft Active Directory environments.☆67Updated 2 years ago
- ☆83Updated 3 years ago
- ☆65Updated 4 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆114Updated 11 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆233Updated last week
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆121Updated 6 months ago
- Reportly is an AzureAD user activity report tool.☆95Updated last year
- ☆115Updated 6 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆235Updated 3 years ago
- BloodHound Attack Research Kit☆549Updated 4 months ago
- ☆172Updated last week
- Tool for creating reports on Entra ID Role Assignments☆94Updated last year
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 10 months ago
- CA Optics - Azure AD Conditional Access Gap Analyzer☆334Updated 11 months ago
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆55Updated 2 years ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆255Updated 2 weeks ago
- Find exposed data in Azure with this public blob scanner☆338Updated last year
- ☆108Updated 2 years ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆115Updated 6 months ago
- retrieve information via O365 and AzureAD with a valid cred☆724Updated 2 years ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆115Updated 10 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆322Updated 2 years ago
- Penetration Testing Azure for Ethical Hackers, published by Packt☆108Updated 7 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆469Updated last year
- Active Directory Audit Tools for IT Audits☆80Updated last month
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆163Updated 3 weeks ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆36Updated 3 years ago