This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defender for Identity instance. This way you can figure out if a company runs Microsoft Defender for Identity.
☆23May 27, 2024Updated last year
Alternatives and similar repositories for Microsoft-Defender-for-Identity-Check-Instance
Users that are interested in Microsoft-Defender-for-Identity-Check-Instance are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆218Nov 13, 2024Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.☆25Updated this week
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Feb 17, 2026Updated last month
- Obtain emails using the LinkedIn Graph API☆11Oct 1, 2025Updated 5 months ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- A basic web implementation of Holehe☆23Apr 8, 2025Updated 11 months ago
- Backend for Nuclear Pond☆21Dec 7, 2023Updated 2 years ago
- using ML models for red teaming☆43Aug 9, 2023Updated 2 years ago
- ☆39Apr 3, 2023Updated 2 years ago
- Offensive security toolkit for Claude Code☆70Mar 15, 2026Updated last week
- Additional Resources to improve Customer Experience with Azure Advanced Threat Protection☆22Jun 12, 2023Updated 2 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- ☆18Jul 13, 2022Updated 3 years ago
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- command control framework☆33Updated this week
- ☆16Aug 25, 2025Updated 6 months ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆368Jun 24, 2025Updated 8 months ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Miscellaneous Azure Sentinel files that don't fall into other categories.☆13Aug 23, 2021Updated 4 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- Your template-based BloodHound terminal companion tool☆447Jan 21, 2026Updated 2 months ago
- Defender XDR Advanced Hunting Queries (MDE, MDAV, Device Discovery)☆12Jan 22, 2026Updated 2 months ago
- Repository for Ludus french templates☆23Mar 1, 2026Updated 3 weeks ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 2 years ago
- ☆23Mar 22, 2025Updated last year
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 3 months ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆14Jan 18, 2019Updated 7 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- SMB Audit Tool you were looking for☆24Jun 16, 2023Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 4 months ago
- A comprehensive list of usable Entra ID first-party clients with pre-consented Microsoft Graph scopes, in a simple YAML-file explorable w…☆151Nov 16, 2025Updated 4 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆95Aug 23, 2025Updated 7 months ago