daddycocoaman / AzDummy
A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.
☆13Updated 3 years ago
Alternatives and similar repositories for AzDummy:
Users that are interested in AzDummy are comparing it to the libraries listed below
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- A tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.☆46Updated 5 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- ☆20Updated 4 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Scripts and One-Liners☆21Updated 2 months ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- PowerShell Pass The Hash Utils☆16Updated 6 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- Random Hashcat Scrips☆28Updated 6 months ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 2 years ago
- Import Nmap scans to Cherrytree☆37Updated 2 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- Threat Mitigation Strategies☆25Updated last year
- Issues to consider when planning a red team exercise.☆14Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆21Updated 4 months ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆14Updated 3 months ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆9Updated 5 years ago