synacktiv / EIPPLinks
Entra ID Password Protection Banned Password Lists
☆16Updated last year
Alternatives and similar repositories for EIPP
Users that are interested in EIPP are comparing it to the libraries listed below
Sorting:
- SACL Scanner is a tool designed to scan and analyze SACLs.☆42Updated 6 months ago
- Linux CS bypass technique☆33Updated 6 months ago
- Scripts to interact with Microsoft Graph APIs☆43Updated 9 months ago
- Nemesis agent for Mythic☆27Updated 11 months ago
- rust port of pspy with support for process monitoring over dbus☆34Updated 2 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 6 months ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 4 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- ☆14Updated last year
- ☆42Updated last year
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Updated 7 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆53Updated last month
- Command Augmentation support for BOFs and .NET assemblies across agents☆27Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Updated 5 months ago
- ☆23Updated 3 years ago
- ☆23Updated last year
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 10 months ago
- Command and Control Framework using powershell implants☆35Updated 2 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 9 months ago
- ☆74Updated 2 years ago
- ☆36Updated 7 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆15Updated 5 months ago
- Python module for running BOFs☆72Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆49Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆31Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- ☆17Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago