talmaor / AzureADLateralMovement
Lateral Movement graph for Azure Active Directory
☆122Updated last year
Related projects ⓘ
Alternatives and complementary repositories for AzureADLateralMovement
- BloodHound with a twist of cloud☆74Updated 4 years ago
- GoldenSAML Attack Libraries and Framework☆65Updated 5 months ago
- ☆149Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆106Updated 3 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆144Updated 3 years ago
- ☆78Updated 4 years ago
- ☆73Updated 2 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆88Updated last year
- PoSh BloodHound Dog Whisperer☆188Updated last year
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆64Updated 4 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆210Updated 3 years ago
- Microsoft Azure Exploitation Framework☆54Updated 3 years ago
- ☆137Updated 4 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆167Updated 6 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆98Updated 4 months ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆227Updated 2 years ago
- GolenGMSA tool for working with GMSA passwords☆136Updated 7 months ago
- Tool that automates Active Directory enumeration☆88Updated 3 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆63Updated 3 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆90Updated 11 months ago
- Resources for our Active Directory security workshops☆139Updated 3 years ago
- ☆13Updated 3 years ago
- ☆161Updated last year
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- TA505+ Adversary Simulation☆65Updated 3 years ago
- A curated list of awesome BloodhoundAD resources☆228Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆88Updated 2 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 5 years ago