morRubin / AzureADJoinedMachinePTC
Tool to perform lateral movement between AAD joined devices
☆56Updated 2 years ago
Alternatives and similar repositories for AzureADJoinedMachinePTC:
Users that are interested in AzureADJoinedMachinePTC are comparing it to the libraries listed below
- ☆20Updated 3 years ago
- ☆20Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Service Enumeration C# .NET Assembly☆60Updated 3 years ago
- A technique for Active Directory domain persistence☆39Updated last year
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- LAPS module for CrackMapExec☆29Updated 3 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- blame Huy☆42Updated 4 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 4 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆99Updated 8 months ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 4 years ago
- GoldenSAML Attack Libraries and Framework☆68Updated 9 months ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- ☆54Updated last year
- Continuous kerberoast monitor☆44Updated last year
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆24Updated 9 months ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- ☆42Updated last year
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- ☆35Updated 2 years ago