talmaor / AzureADLateralMovementLinks
Lateral Movement graph for Azure Active Directory
☆122Updated 2 years ago
Alternatives and similar repositories for AzureADLateralMovement
Users that are interested in AzureADLateralMovement are comparing it to the libraries listed below
Sorting:
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- BloodHound with a twist of cloud☆80Updated 4 years ago
- ☆91Updated 4 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- PoSh BloodHound Dog Whisperer☆191Updated 2 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆170Updated 6 years ago
- Microsoft Azure Exploitation Framework☆57Updated 3 years ago
- ☆150Updated 3 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated last year
- ☆76Updated 3 years ago
- ☆140Updated 5 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆100Updated 11 months ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆222Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated 10 months ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- GolenGMSA tool for working with GMSA passwords☆150Updated last year
- ☆13Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆91Updated 3 years ago
- ☆144Updated last year
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆91Updated 2 years ago
- ☆162Updated 2 years ago
- User enumeration with Microsoft Teams API☆172Updated 3 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- Resources for our Active Directory security workshops☆139Updated 3 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆188Updated 3 years ago
- A Powershell module that helps you identify AppLocker weaknesses☆168Updated 5 years ago
- Leghorn code for PKI abuse☆32Updated 3 years ago
- ☆100Updated 2 years ago
- ☆169Updated 5 years ago