sfonteneau / AADInternals_python
☆22Updated this week
Alternatives and similar repositories for AADInternals_python:
Users that are interested in AADInternals_python are comparing it to the libraries listed below
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆9Updated last year
- Scripts to enumerate and report on Entra Conditional Access☆26Updated 6 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- blame Huy☆42Updated 4 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆24Updated 8 months ago
- General scripts that gather information out of Active Directory☆16Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 6 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- ☆20Updated 3 years ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆25Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆34Updated 4 months ago
- Simple and sane cryptographic wrapper library.☆26Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆27Updated last year
- ☆20Updated 4 years ago
- Qemuno Framework☆24Updated 2 years ago
- Random scripts for azure stuff☆11Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 9 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆47Updated 3 years ago
- ☆45Updated this week
- A technique for Active Directory domain persistence☆39Updated last year
- Parser for Windows PowerShell script block logs☆13Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆30Updated this week
- Tool to perform lateral movement between AAD joined devices☆55Updated 2 years ago
- ☆17Updated last year