sabrinalupsan / pentesting-azure-adView external linksLinks
A cheatsheet of commands used to pass the CARTP (Certified Azure Red Team Professional) exam.
☆21May 4, 2023Updated 2 years ago
Alternatives and similar repositories for pentesting-azure-ad
Users that are interested in pentesting-azure-ad are comparing it to the libraries listed below
Sorting:
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- ☆13Mar 3, 2025Updated 11 months ago
- Powershell Script to enumerate AzureAD and output good data☆14Nov 8, 2023Updated 2 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆34Feb 1, 2026Updated 2 weeks ago
- MLOps Attack Toolkit☆29Aug 25, 2025Updated 5 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Collection of templates for linux☆10Jun 2, 2024Updated last year
- A fast TCP/UDP tunnel over HTTP☆23Jan 9, 2025Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆47Aug 20, 2025Updated 5 months ago
- Command-line tool to identify useragents that bypasses proxy restrictions☆11Oct 23, 2025Updated 3 months ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- ☆33Mar 19, 2025Updated 10 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆35Nov 24, 2024Updated last year
- Lsass dumper evading (all ?) EDR detection☆48Nov 10, 2025Updated 3 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- 内存加载FRP☆10Sep 11, 2023Updated 2 years ago
- Rapid Response sample Foundry app☆14Updated this week
- Azure APIs enumeration and abuse☆13Dec 20, 2024Updated last year
- This tool is a simple ffuf launcher which lets you select dynamically which wordlist and which extentions you want to fuzz.☆10Sep 10, 2025Updated 5 months ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Apr 10, 2023Updated 2 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 6 months ago
- Obtain emails using the LinkedIn Graph API☆11Oct 1, 2025Updated 4 months ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Find hidden directories from domain and subdomain.☆11Mar 27, 2022Updated 3 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 9 months ago
- ARMANDroid - anti-repackaging tool for Android apps☆15Dec 18, 2020Updated 5 years ago
- Repository for AsBuiltReport Veeam Backup for Microsoft 365 module☆14Dec 21, 2025Updated last month
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 8 months ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Updated this week