zh54321 / PoCEntraDeviceComplianceBypassLinks
Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy
☆166Updated 2 months ago
Alternatives and similar repositories for PoCEntraDeviceComplianceBypass
Users that are interested in PoCEntraDeviceComplianceBypass are comparing it to the libraries listed below
Sorting:
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆122Updated last month
- A comprehensive list of usable Entra ID first-party clients with pre-consented Microsoft Graph scopes, in a simple YAML-file explorable w…☆147Updated 2 months ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Updated 10 months ago
- ☆186Updated last month
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆135Updated 5 months ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38Updated 8 months ago
- 🌩️ Collection of BloodHound queries for Azure☆82Updated last year
- ☆277Updated 5 months ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆100Updated last month
- A tool to create randomly insecure file shares that also contain unsecured credential files☆47Updated last year
- Hybrid AD utilities for ROADtools☆105Updated 8 months ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆134Updated 4 months ago
- Location of some Active Directory lab scripts I have created and find useful☆84Updated 2 months ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆310Updated 2 weeks ago
- Scripts to enumerate and report on Entra Conditional Access☆41Updated 4 months ago
- ☆100Updated 5 months ago
- Automatically run and populate a new instance of BH CE☆113Updated 2 months ago
- ☆160Updated last year
- Parses Snaffler output file and generate beautified outputs.☆130Updated 3 weeks ago
- BloodHound PowerShell client☆76Updated last month
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆169Updated last year
- ☆138Updated 4 months ago
- Abusing Azure services over C2☆367Updated last week
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆306Updated 3 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- An offensive toolkit for restless guests #DEFCON33☆54Updated 5 months ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆206Updated last year
- Azure Post Exploitation Framework☆244Updated 3 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Updated 10 months ago