Get notified on the addition or removal of roles and permissions in Microsoft Entra ID and Azure
☆19May 7, 2026Updated this week
Alternatives and similar repositories for az-role-watcher
Users that are interested in az-role-watcher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Azure administrative tiering based on known attack paths☆154Apr 29, 2026Updated last week
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆44Dec 7, 2025Updated 5 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆119Aug 19, 2025Updated 8 months ago
- MS Entra ID Protection Guidance☆22Apr 2, 2024Updated 2 years ago
- Share Azure Policies with the community☆13Jun 12, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆418Apr 12, 2026Updated 3 weeks ago
- ☆10Aug 24, 2024Updated last year
- This sample demonstrates a data pipeline built with Azure Durable Functions: it reads questions from a blob, routes them to an Azure Open…☆20Apr 7, 2025Updated last year
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- A comprehensive list of usable Entra ID first-party clients with pre-consented Microsoft Graph scopes, in a simple YAML-file explorable w…☆160Mar 20, 2026Updated last month
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆46Nov 29, 2024Updated last year
- Fake-Out : Fake-Out is an email spoofing tool created by HackEthics138, with security measures provided by Team Illusion. Thi…☆12Aug 19, 2024Updated last year
- PowerShell module to help getting tokens using managed identities☆17Dec 29, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆47Nov 16, 2023Updated 2 years ago
- network4dev.net website☆10Sep 30, 2020Updated 5 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆68Dec 20, 2024Updated last year
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆70Mar 20, 2024Updated 2 years ago
- Dart useful tools: collections, math, date, etc...☆10Feb 26, 2026Updated 2 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14May 15, 2024Updated last year
- ☆13May 21, 2025Updated 11 months ago
- Azure monitor workbook focusing on reliability recommendations for deployed resources on Azure☆61Sep 3, 2024Updated last year
- AzLogDcrIngestPS - Unleashing the power of Log Ingestion API with Azure LogAnalytics custom table v2, Azure Data Collection Rules and Azu…☆34Apr 13, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10Mar 3, 2023Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆10Jun 15, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- ☆23Jan 21, 2025Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- ☆17Jun 28, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- Microsoft Security Baseline Configuration☆13Nov 10, 2018Updated 7 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- ☆121Jun 2, 2021Updated 4 years ago
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆15Mar 7, 2024Updated 2 years ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆31Apr 20, 2026Updated 2 weeks ago