Azure Security Resources and Notes
☆1,716Feb 17, 2026Updated last month
Alternatives and similar repositories for Azure-Red-Team
Users that are interested in Azure-Red-Team are comparing it to the libraries listed below
Sorting:
- A collection of scripts for assessing Microsoft Azure security☆2,319Oct 29, 2025Updated 4 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,542Feb 5, 2026Updated last month
- Azure JWT Token Manipulation Toolset☆718Dec 6, 2024Updated last year
- PowerShell framework to assess Azure security☆1,261Oct 18, 2025Updated 5 months ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,478Dec 31, 2025Updated 2 months ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,689Jan 8, 2024Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,372Oct 27, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,373Mar 9, 2026Updated last week
- Framework for Kerberos relaying☆938May 29, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,634Aug 6, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,063Jan 22, 2026Updated last month
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,639Mar 4, 2025Updated last year
- The swiss army knife of LSASS dumping☆2,081Sep 17, 2024Updated last year
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,183Dec 27, 2023Updated 2 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆398Feb 9, 2026Updated last month
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,878Aug 18, 2023Updated 2 years ago
- AADInternals PowerShell module for administering Azure AD and Office 365☆1,607Sep 30, 2025Updated 5 months ago
- Remote operations commands implemented using Beacon Object Files☆1,139Mar 5, 2026Updated 2 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,648Aug 28, 2025Updated 6 months ago
- ☆2,173Feb 21, 2023Updated 3 years ago
- An Office365 User Attack Tool☆646Mar 19, 2024Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- NTLM relaying for Windows made easy☆581Apr 25, 2023Updated 2 years ago
- BloodHound Attack Research Kit☆586Mar 18, 2025Updated last year
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆867Mar 20, 2023Updated 2 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,806Sep 17, 2024Updated last year
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,081Mar 19, 2024Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆840Dec 2, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆505Mar 4, 2026Updated 2 weeks ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,111Feb 27, 2026Updated 3 weeks ago
- A C# utility for interacting with SCCM☆683Aug 20, 2025Updated 7 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,261Jul 22, 2025Updated 7 months ago
- ☆613Jun 1, 2023Updated 2 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆785Aug 26, 2025Updated 6 months ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,401Nov 22, 2023Updated 2 years ago
- Active Directory certificate abuse.☆1,929Oct 27, 2025Updated 4 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,112Jun 10, 2024Updated last year