thalpius / Microsoft-Defender-for-Identity-Check-Instance
This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defender for Identity instance. This way you can figure out if a company runs Microsoft Defender for Identity.
☆24Updated 11 months ago
Alternatives and similar repositories for Microsoft-Defender-for-Identity-Check-Instance
Users that are interested in Microsoft-Defender-for-Identity-Check-Instance are comparing it to the libraries listed below
Sorting:
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆89Updated 11 months ago
- ☆21Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆62Updated last month
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Custom queries list for BloodHound☆28Updated 8 months ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Enumerate and check domains for Azure tenants☆58Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- ☆100Updated 2 years ago
- Scripts that automate portions of pentests.☆50Updated 2 weeks ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆44Updated 10 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools