dirkjanm / BloodHound-AzureADLinks
BloodHound with a twist of cloud
☆81Updated 5 years ago
Alternatives and similar repositories for BloodHound-AzureAD
Users that are interested in BloodHound-AzureAD are comparing it to the libraries listed below
Sorting:
- Lateral Movement graph for Azure Active Directory☆123Updated 2 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated last year
- BloodHound Data Scanner☆45Updated 5 years ago
- ☆93Updated 4 years ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆103Updated last year
- Terraform config to spin up a domain controller and some member servers in azure☆32Updated 3 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆93Updated 2 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- ☆115Updated 6 years ago
- Leghorn code for PKI abuse☆32Updated 4 years ago
- ☆70Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆10Updated last year
- Microsoft Azure Exploitation Framework☆57Updated 4 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆147Updated 4 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆74Updated 4 months ago
- ☆77Updated last month
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆79Updated 2 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- PoSh BloodHound Dog Whisperer☆191Updated 2 years ago
- ☆75Updated last year
- Kerberoast Detection Script☆30Updated 9 months ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- blame Huy☆42Updated 4 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆123Updated last year
- LAPS module for CrackMapExec☆29Updated 3 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago