mburrough / pentestingazureappsLinks
Script samples from the book Pentesting Azure Applications (2018, No Starch Press)
☆88Updated 6 years ago
Alternatives and similar repositories for pentestingazureapps
Users that are interested in pentestingazureapps are comparing it to the libraries listed below
Sorting:
- Microsoft Azure Exploitation Framework☆59Updated 4 years ago
- Lateral Movement graph for Azure Active Directory☆124Updated 2 years ago
- ☆167Updated 5 years ago
- ☆70Updated 2 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Some bash to make life easier after a new kali install..☆33Updated 2 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 6 years ago
- ☆80Updated 5 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Resources for our Active Directory security workshops☆140Updated 4 years ago
- ☆69Updated 4 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 2 years ago
- Resolves an IP address to the cloud provider it is hosted on☆97Updated last week
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Material for the "Hands-On BloodHound" Workshop☆110Updated 4 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- This script is a multi-threaded Okta password sprayer.☆71Updated last year
- List of Repositories☆102Updated 4 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆149Updated 4 years ago
- ☆139Updated 5 years ago
- Helps with finding and registering categorized domains☆70Updated 4 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- ☆76Updated 7 years ago
- Purple Team Security☆75Updated 3 years ago
- BloodHound with a twist of cloud☆81Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆111Updated 11 months ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆105Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆48Updated last month
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago