zh54321 / PoCEntraDeviceComplianceBypass
Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy
☆132Updated last month
Alternatives and similar repositories for PoCEntraDeviceComplianceBypass:
Users that are interested in PoCEntraDeviceComplianceBypass are comparing it to the libraries listed below
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆163Updated 5 months ago
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆81Updated this week
- ☆77Updated 2 months ago
- Automatically run and populate a new instance of BH CE☆64Updated 4 months ago
- Abusing Intune for Lateral Movement over C2☆324Updated last week
- Azure Post Exploitation Framework☆164Updated 3 weeks ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆138Updated 9 months ago
- ☆142Updated 3 weeks ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆163Updated 5 months ago
- Parses Snaffler output file and generate beautified outputs.☆71Updated 3 weeks ago
- ☆176Updated 2 months ago
- Azure DevOps Services Attack Toolkit☆137Updated 6 months ago
- ☆190Updated this week
- Hybrid AD utilities for ROADtools☆67Updated 2 weeks ago
- ☆206Updated 4 months ago
- A BloodHound collector for Microsoft Configuration Manager☆301Updated last month
- An Ansible collection that installs an SCCM deployment with optional configurations.☆69Updated 7 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆257Updated 3 weeks ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆194Updated 2 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆98Updated 5 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆177Updated 6 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆108Updated 3 weeks ago
- Reportly is an AzureAD user activity report tool.☆91Updated last year
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆247Updated 3 weeks ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆142Updated 2 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- ☆106Updated last year