dirkjanm / BloodHound-AzureADLinks
BloodHound with a twist of cloud
☆80Updated 4 years ago
Alternatives and similar repositories for BloodHound-AzureAD
Users that are interested in BloodHound-AzureAD are comparing it to the libraries listed below
Sorting:
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- ☆91Updated 4 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆100Updated 11 months ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆91Updated 2 years ago
- ☆76Updated 3 years ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆9Updated last year
- Microsoft Azure Exploitation Framework☆57Updated 3 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated 11 months ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Kerberoast Detection Script☆30Updated 7 months ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆170Updated 6 years ago
- Tool to perform lateral movement between AAD joined devices☆61Updated 2 years ago
- ☆23Updated 3 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- ☆100Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- Leghorn code for PKI abuse☆32Updated 3 years ago
- LAPS module for CrackMapExec☆29Updated 3 years ago
- ☆114Updated 5 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆140Updated 5 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆91Updated 3 years ago
- ☆144Updated last year