lkarlslund / azureimposterLinks
Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token
☆26Updated 2 years ago
Alternatives and similar repositories for azureimposter
Users that are interested in azureimposter are comparing it to the libraries listed below
Sorting:
- blame Huy☆42Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- ☆25Updated 3 years ago
- BloodHound Data Scanner☆45Updated 5 years ago
- ☆23Updated 3 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆33Updated last year
- Threat Mitigation Strategies☆25Updated 3 weeks ago
- Azure AD Identity Protection Cookie Spoofing☆34Updated 2 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- Leghorn code for PKI abuse☆32Updated 4 years ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆10Updated last year
- Bloodhound Portable for Windows☆53Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Kerberoast Detection Script☆30Updated 10 months ago
- BloodHound with a twist of cloud☆81Updated 5 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated 2 years ago
- ☆43Updated 4 years ago
- Scripts to enumerate and report on Entra Conditional Access☆38Updated last week
- ☆28Updated 5 years ago
- ☆21Updated 2 weeks ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 4 years ago
- Active Directory Toolkit☆20Updated 6 years ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆23Updated 11 months ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last month
- ☆23Updated 6 months ago
- ☆103Updated 2 years ago