sap8899 / Group3rExplorerLinks
Fun GUI for Group3rs output log
☆37Updated last year
Alternatives and similar repositories for Group3rExplorer
Users that are interested in Group3rExplorer are comparing it to the libraries listed below
Sorting:
- Scripts to enumerate and report on Entra Conditional Access☆32Updated last month
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Updated 8 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated last year
- ☆11Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆39Updated 6 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆38Updated 4 months ago
- ☆25Updated 3 years ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆47Updated 3 months ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆25Updated last month
- ☆21Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆49Updated last year
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆41Updated 3 months ago
- blame Huy☆42Updated 4 years ago
- ☆13Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆57Updated 4 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆61Updated last year
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆21Updated this week
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆12Updated last year
- Tool to perform lateral movement between AAD joined devices☆61Updated 3 years ago
- ☆46Updated last year
- Scripts to interact with Microsoft Graph APIs☆42Updated 7 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30Updated last year
- AADInternals-Endpoints PowerShell module☆27Updated 2 months ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- ☆35Updated 2 years ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆22Updated 8 months ago
- ☆23Updated 3 years ago