☆109Feb 21, 2023Updated 3 years ago
Alternatives and similar repositories for Azure-AccessPermissions
Users that are interested in Azure-AccessPermissions are comparing it to the libraries listed below
Sorting:
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- ACL abuse swiss-knife☆127Feb 3, 2023Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165May 6, 2023Updated 2 years ago
- CA Optics - Azure AD Conditional Access Gap Analyzer☆334Aug 28, 2024Updated last year
- ☆329Apr 17, 2023Updated 2 years ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- Microsoft Entra ID App Audit Solution (AADAppAudit)☆84Aug 28, 2024Updated last year
- ☆107Jan 4, 2023Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆97Jul 30, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆414Jan 13, 2026Updated last month
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Feb 12, 2023Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆302Jan 20, 2026Updated last month
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆233Jun 17, 2022Updated 3 years ago
- ☆90Aug 5, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,256Jul 22, 2025Updated 7 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- LDAP enumeration tool implemented in Python3☆224May 20, 2025Updated 9 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆314Feb 16, 2026Updated 2 weeks ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,241Updated this week
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Jul 3, 2024Updated last year
- Kubernetes exploitation tool☆363Feb 25, 2026Updated last week
- Assess the security of your Active Directory with few or all privileges.☆346Updated this week
- BloodHound Attack Research Kit☆586Mar 18, 2025Updated 11 months ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,475Feb 18, 2026Updated 2 weeks ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆131Jan 27, 2026Updated last month