thalpius / Microsoft-Defender-for-Identity-Check-Instance
This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defender for Identity instance. This way you can figure out if a company runs Microsoft Defender for Identity.
☆21Updated 8 months ago
Alternatives and similar repositories for Microsoft-Defender-for-Identity-Check-Instance:
Users that are interested in Microsoft-Defender-for-Identity-Check-Instance are comparing it to the libraries listed below
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆86Updated 8 months ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆56Updated 3 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 5 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆43Updated 2 weeks ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆53Updated this week
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated last year
- ☆54Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆91Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆71Updated last year
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- ☆20Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 10 months ago
- Convert ldapdomaindump to Bloodhound☆78Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- Exchangelib wrapper for pentesting☆59Updated this week
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆98Updated 7 months ago
- ☆20Updated 3 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆34Updated 2 years ago
- Find Inbound Email Domains☆21Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago