This script validates the most common Conditional Access policies in Microsoft 365.
☆10May 27, 2024Updated last year
Alternatives and similar repositories for Microsoft-Azure-AD-Conditional-Access-Validator
Users that are interested in Microsoft-Azure-AD-Conditional-Access-Validator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- ☆23Mar 9, 2022Updated 4 years ago
- GolenGMSA tool for working with GMSA passwords☆172Aug 21, 2025Updated 7 months ago
- Sysmon Config Pusher - Modernized☆34Jan 7, 2026Updated 2 months ago
- SecureScore module to allow easy downloading of the MS secure score☆15Aug 21, 2021Updated 4 years ago
- Public Intune repository of scripts that I create/maintain☆19Feb 27, 2026Updated 3 weeks ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- ☆71Nov 20, 2020Updated 5 years ago
- Show PIM role to solve a task - and group to activate the needed permission☆15May 22, 2025Updated 10 months ago
- ☆10Jan 22, 2016Updated 10 years ago
- An Azure SPN access minimizer☆48Jan 15, 2026Updated 2 months ago
- Tools and scripts that are useful with the Microsoft Entra ID, M365, and Azure cloud☆15Aug 29, 2025Updated 6 months ago
- Repository for sample templates for BI for Intune reports.☆13Mar 6, 2026Updated 2 weeks ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- Misc PowerShell code☆14Nov 4, 2020Updated 5 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- Upcoming list of ctfs directly in your terminal!☆16Apr 17, 2023Updated 2 years ago
- ☆48Dec 28, 2025Updated 2 months ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- Community developed SCOM Management Pack for VMware☆13Apr 28, 2021Updated 4 years ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- Meraki monitoring through Zabbix☆10Jul 31, 2023Updated 2 years ago
- Demonstrates how to use the Azure Storage v10 SDK to implement a Blob trigger function to resize images in Node.js.☆15Jun 17, 2021Updated 4 years ago
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- Application Insights for PowerShell scripts and Modules☆12Jan 22, 2019Updated 7 years ago
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 8 months ago
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated last month
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆237Jun 25, 2020Updated 5 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Authentication Module for connecting to Microsoft Cloud Services☆11May 5, 2021Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- ☆39Updated this week
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 7 months ago