rvrsh3ll / Azure-App-Tools
Collection of tools to use with Azure Applications
☆109Updated last year
Alternatives and similar repositories for Azure-App-Tools:
Users that are interested in Azure-App-Tools are comparing it to the libraries listed below
- ☆100Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- Get Fine Grained Password Policy☆68Updated 10 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆120Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆121Updated 3 years ago
- Living off the land searches for explorer and sharepoint☆57Updated 4 months ago
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- ☆158Updated 4 months ago
- ☆148Updated last month
- Hybrid AD utilities for ROADtools☆70Updated last month
- ☆12Updated this week
- AAD related enumeration in Nim☆128Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated last month
- ☆87Updated 2 years ago
- pysnaffler☆91Updated this week
- GolenGMSA tool for working with GMSA passwords☆139Updated 11 months ago
- Efflanrs - GUI for Snaffler Output☆26Updated 6 months ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- ☆71Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- ☆36Updated last year
- A Python POC for CRED1 over SOCKS5☆142Updated 5 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 10 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- Updated 11 months ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆54Updated last month