morRubin / AzureADJoinedMachinePTC
Tool to perform lateral movement between AAD joined devices
☆53Updated 2 years ago
Alternatives and similar repositories for AzureADJoinedMachinePTC:
Users that are interested in AzureADJoinedMachinePTC are comparing it to the libraries listed below
- ☆20Updated 3 years ago
- ☆19Updated 4 years ago
- A technique for Active Directory domain persistence☆39Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- ☆36Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 5 months ago
- ☆56Updated 3 years ago
- ☆71Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- ☆54Updated last year
- LAPS module for CrackMapExec☆29Updated 3 years ago
- blame Huy☆42Updated 4 years ago
- ☆82Updated 2 years ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆21Updated 8 months ago
- Convert ldapdomaindump to Bloodhound☆78Updated last year
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- Find Inbound Email Domains☆21Updated last year
- ☆37Updated 9 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- Scripts to enumerate and report on Entra Conditional Access☆22Updated 5 months ago
- ☆85Updated 2 years ago
- ☆43Updated 3 weeks ago
- Exchangelib wrapper for pentesting☆59Updated this week