synacktiv / EIPPLinks
Entra ID Password Protection Banned Password Lists
☆16Updated last year
Alternatives and similar repositories for EIPP
Users that are interested in EIPP are comparing it to the libraries listed below
Sorting:
- ☆36Updated 6 months ago
- Scripts to interact with Microsoft Graph APIs☆43Updated 8 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 10 months ago
- Nemesis agent for Mythic☆27Updated 11 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 5 months ago
- Linux CS bypass technique☆33Updated 6 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 3 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆40Updated 5 months ago
- ☆31Updated 2 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆51Updated last week
- ☆17Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Updated 4 months ago
- rust port of pspy with support for process monitoring over dbus☆34Updated last month
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Updated 6 months ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Docker container for running CobaltStrike 4.7 and above☆22Updated 4 months ago
- Blog/Journal on how to backdoor VSCode extensions☆63Updated 2 weeks ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆35Updated 3 months ago
- ☆23Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆24Updated last month
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 4 months ago
- ☆14Updated last year
- ☆42Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 9 months ago