This script validates the most common Conditional Access policies in Microsoft 365.
☆10May 27, 2024Updated last year
Alternatives and similar repositories for Microsoft-Azure-AD-Conditional-Access-Validator
Users that are interested in Microsoft-Azure-AD-Conditional-Access-Validator are comparing it to the libraries listed below
Sorting:
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Sysmon Config Pusher - Modernized☆33Jan 7, 2026Updated last month
- ☆53Oct 20, 2020Updated 5 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- ☆71Nov 20, 2020Updated 5 years ago
- A collection of infrastructure related tests for use with Pester & PowerShell.☆46Oct 15, 2019Updated 6 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- Automate Azure subscription check against CIS Benchmark☆22Jun 29, 2018Updated 7 years ago
- Upcoming list of ctfs directly in your terminal!☆16Apr 17, 2023Updated 2 years ago
- ☆47Dec 28, 2025Updated 2 months ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆89Nov 12, 2021Updated 4 years ago
- GolenGMSA tool for working with GMSA passwords☆170Aug 21, 2025Updated 6 months ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- ☆23Mar 9, 2022Updated 3 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated 2 weeks ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Files for http://deniable.org/windows/windows-callbacks☆26Jul 9, 2020Updated 5 years ago
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 6 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Jul 12, 2020Updated 5 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆238Jun 25, 2020Updated 5 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- ☆22Jan 24, 2019Updated 7 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Jul 14, 2021Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆258Dec 2, 2021Updated 4 years ago
- The original slurp source☆32Nov 25, 2018Updated 7 years ago
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 3 months ago