csandker / Azure-AccessPermissions
☆108Updated 2 years ago
Alternatives and similar repositories for Azure-AccessPermissions:
Users that are interested in Azure-AccessPermissions are comparing it to the libraries listed below
- Reportly is an AzureAD user activity report tool.☆92Updated last year
- Azure AD enumeration over MS Graph☆80Updated 2 years ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆165Updated 6 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆109Updated 7 months ago
- ☆177Updated 3 months ago
- Audit program for AzureAD☆146Updated last year
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆88Updated last month
- Azure DevOps Services Attack Toolkit☆140Updated this week
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆105Updated 3 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆100Updated 6 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 3 months ago
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆112Updated last month
- Table of AD and Azure assets and whether they belong to Tier Zero☆215Updated last month
- ☆105Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- A collection of tools, scripts and personal research☆127Updated 8 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆162Updated 5 months ago
- Azure AD cheatsheet for the CARTP course☆108Updated 2 years ago
- ResearchDev - XDR & SIEM Detection☆64Updated 2 weeks ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆136Updated 3 weeks ago
- Tools for attacking Azure Function Apps☆68Updated 4 months ago
- Automatically run and populate a new instance of BH CE☆67Updated this week
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 9 months ago
- ☆83Updated this week
- ☆49Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆168Updated 6 months ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Updated 8 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆270Updated 3 weeks ago