mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-12-22 17:15:06 +01:00
Added AzureRT
This commit is contained in:
parent
ec6f30a230
commit
787d12ba63
3
.gitmodules
vendored
3
.gitmodules
vendored
@ -55,3 +55,6 @@
|
||||
[submodule "phishing/decode-spam-headers"]
|
||||
path = phishing/decode-spam-headers
|
||||
url = https://github.com/mgeeky/decode-spam-headers
|
||||
[submodule "clouds/azure/AzureRT"]
|
||||
path = clouds/azure/AzureRT
|
||||
url = https://github.com/mgeeky/AzureRT
|
||||
|
1
clouds/azure/AzureRT
Submodule
1
clouds/azure/AzureRT
Submodule
@ -0,0 +1 @@
|
||||
Subproject commit b3364cb84dd8758c3b65690a10c3a0475738790b
|
33
clouds/azure/README.md
Normal file
33
clouds/azure/README.md
Normal file
@ -0,0 +1,33 @@
|
||||
|
||||
## Azure-related penetration testing scripts, tools and Cheatsheets
|
||||
|
||||
|
||||
- **`AzureRT`** - Powershell module implementing various cmdlets to interact with Azure and Azure AD from an offensive perspective. Helpful utilities dealing with access token based authentication, easily switching from `Az` to `AzureAD` and `az cli` interfaces, easy to use pre-made attacks such as Runbook-based command execution and more.
|
||||
|
||||
Authentication & Token mechanics:
|
||||
|
||||
- *`Connect-ART`*
|
||||
- *`Connect-ARTAD`*
|
||||
- *`Connect-ARTADServicePrincipal`*
|
||||
- *`Get-ARTAccessTokenAzCli`*
|
||||
- *`Get-ARTAccessTokenAz`*
|
||||
- *`Get-ARTAccessTokenAzureAD`*
|
||||
- *`Parse-JWTtokenRT`*
|
||||
- *`Remove-ARTServicePrincipalKey`*
|
||||
|
||||
Recon and Situational Awareness:
|
||||
|
||||
- *`Get-ARTResource`*
|
||||
- *`Get-ARTRolePermissions`*
|
||||
- *`Get-ARTADRolePermissions`*
|
||||
- *`Get-ARTAzRoleAssignment`*
|
||||
- *`Get-ARTKeyVaultSecrets`*
|
||||
|
||||
Privilege Escalation:
|
||||
|
||||
- *`Add-ARTUserToGroup`*
|
||||
- *`Add-ARTUserToRole`*
|
||||
|
||||
Lateral Movement:
|
||||
|
||||
- *`Invoke-ARTAutomationRunbook`*
|
Loading…
Reference in New Issue
Block a user