MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
☆420Jan 13, 2026Updated 2 months ago
Alternatives and similar repositories for MAAD-AF
Users that are interested in MAAD-AF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,377Mar 9, 2026Updated 3 weeks ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆507Mar 4, 2026Updated last month
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,571Feb 5, 2026Updated 2 months ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,489Dec 31, 2025Updated 3 months ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,258Mar 19, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆324Oct 12, 2025Updated 5 months ago
- BloodHound Attack Research Kit☆588Mar 18, 2025Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- AADInternals PowerShell module for administering Azure AD and Office 365☆1,619Sep 30, 2025Updated 6 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆723Dec 6, 2024Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆580Jan 20, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A C# utility for interacting with SCCM☆686Mar 30, 2026Updated last week
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,493Feb 18, 2026Updated last month
- BlueHound - pinpoint the security issues that actually matter☆760Jul 12, 2023Updated 2 years ago
- CA Optics - Azure AD Conditional Access Gap Analyzer☆336Aug 28, 2024Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆344Feb 23, 2024Updated 2 years ago
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,642Mar 4, 2025Updated last year
- Collection of offensive tools targeting Microsoft Azure☆220Updated this week
- A collection of scripts for assessing Microsoft Azure security☆2,342Mar 15, 2026Updated 3 weeks ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆903Mar 31, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- PowerShell framework to assess Azure security☆1,264Oct 18, 2025Updated 5 months ago
- Your template-based BloodHound terminal companion tool☆448Jan 21, 2026Updated 2 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆415Mar 21, 2025Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,270Mar 27, 2026Updated last week
- ☆109Feb 21, 2023Updated 3 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆237Sep 3, 2023Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,139Dec 21, 2025Updated 3 months ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,148Feb 21, 2026Updated last month
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆583Dec 6, 2025Updated 4 months ago
- Azure DevOps Services Attack Toolkit☆151Mar 15, 2025Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Feb 13, 2024Updated 2 years ago
- A PowerShell script that automates the security assessment of Microsoft 365 environments.☆651Apr 8, 2025Updated last year
- ☆615Jun 1, 2023Updated 2 years ago