zh54321 / PoCEntraDeviceComplianceBypassLinks
Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy
☆156Updated 6 months ago
Alternatives and similar repositories for PoCEntraDeviceComplianceBypass
Users that are interested in PoCEntraDeviceComplianceBypass are comparing it to the libraries listed below
Sorting:
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆33Updated 3 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆73Updated last week
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆108Updated last month
- ☆112Updated last month
- A comprehensive list of usable Entra ID first-party clients with pre-consented Microsoft Graph scopes, in a simple YAML-file explorable w…☆122Updated 5 months ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆42Updated 5 months ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆118Updated 7 months ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆89Updated 2 months ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆257Updated last week
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 7 months ago
- ☆158Updated 7 months ago
- Abusing Azure services over C2☆351Updated 3 months ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆45Updated last year
- Hybrid AD utilities for ROADtools☆87Updated 3 months ago
- Automatically run and populate a new instance of BH CE☆97Updated last month
- ☆241Updated 2 weeks ago
- Active Directory Firewall☆81Updated last week
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆249Updated 11 months ago
- Azure Post Exploitation Framework☆204Updated 6 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆185Updated last year
- Azure DevOps Services Attack Toolkit☆146Updated 5 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆158Updated last year
- ☆106Updated last year
- ☆79Updated 2 weeks ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆86Updated last week
- Scripts to enumerate and report on Entra Conditional Access☆36Updated last week
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆253Updated 8 months ago
- ☆107Updated 2 years ago
- ☆11Updated 2 years ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Updated 10 months ago