lkarlslund / azureimposter
Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token
☆25Updated 2 years ago
Alternatives and similar repositories for azureimposter:
Users that are interested in azureimposter are comparing it to the libraries listed below
- ☆22Updated 2 years ago
- Azure AD Identity Protection Cookie Spoofing☆32Updated last year
- Threat Mitigation Strategies☆25Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 4 years ago
- blame Huy☆42Updated 4 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆32Updated last year
- Bloodhound Portable for Windows☆51Updated last year
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- ☆20Updated 3 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Fun GUI for Group3rs output log☆37Updated last year
- Scripts to enumerate and report on Entra Conditional Access☆27Updated 6 months ago
- Continuous kerberoast monitor☆44Updated last year
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆15Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Kerberoast Detection Script☆30Updated 4 months ago
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- ☆22Updated 2 weeks ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated last year
- Tool to perform lateral movement between AAD joined devices☆55Updated 2 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆34Updated last year
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- Repository that contains random short projects like write-ups, PowerShell scripts, and more.☆28Updated 3 months ago
- Leghorn code for PKI abuse☆32Updated 3 years ago
- ☆41Updated 3 years ago
- ☆20Updated last year