zh54321 / PoCEntraDeviceComplianceBypassLinks
Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy
☆165Updated last month
Alternatives and similar repositories for PoCEntraDeviceComplianceBypass
Users that are interested in PoCEntraDeviceComplianceBypass are comparing it to the libraries listed below
Sorting:
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆121Updated 3 weeks ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Updated 9 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆130Updated 4 months ago
- ☆181Updated 2 weeks ago
- A comprehensive list of usable Entra ID first-party clients with pre-consented Microsoft Graph scopes, in a simple YAML-file explorable w…☆147Updated last month
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆37Updated 7 months ago
- Active Directory Firewall☆93Updated last month
- 🌩️ Collection of BloodHound queries for Azure☆81Updated 11 months ago
- A PowerShell variant of the amazing patch_review.py by kevthehermit☆74Updated 2 months ago
- Automatically run and populate a new instance of BH CE☆112Updated 2 months ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆97Updated 3 weeks ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆47Updated last year
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆309Updated last week
- A tiny tool built to help AD Admins tame the Protected Users group.☆134Updated 3 months ago
- Location of some Active Directory lab scripts I have created and find useful☆85Updated last month
- ☆272Updated 4 months ago
- ☆111Updated last year
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆295Updated 2 months ago
- Abusing Azure services over C2☆366Updated 7 months ago
- ☆133Updated 3 months ago
- ☆161Updated 11 months ago
- ☆67Updated last month
- Simple PowerShell HTTP Server (no dependencies, single file, PowerShell 5.1/7)☆88Updated 11 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆154Updated 3 weeks ago
- Hybrid AD utilities for ROADtools☆102Updated 7 months ago
- Azure Post Exploitation Framework☆243Updated 2 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆164Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆205Updated last year
- Parses Snaffler output file and generate beautified outputs.☆113Updated 11 months ago