diff --git a/.gitmodules b/.gitmodules index 68a6083..1ef8675 100644 --- a/.gitmodules +++ b/.gitmodules @@ -55,3 +55,6 @@ [submodule "phishing/decode-spam-headers"] path = phishing/decode-spam-headers url = https://github.com/mgeeky/decode-spam-headers +[submodule "clouds/azure/AzureRT"] + path = clouds/azure/AzureRT + url = https://github.com/mgeeky/AzureRT diff --git a/clouds/azure/AzureRT b/clouds/azure/AzureRT new file mode 160000 index 0000000..b3364cb --- /dev/null +++ b/clouds/azure/AzureRT @@ -0,0 +1 @@ +Subproject commit b3364cb84dd8758c3b65690a10c3a0475738790b diff --git a/clouds/azure/README.md b/clouds/azure/README.md new file mode 100644 index 0000000..b33a24e --- /dev/null +++ b/clouds/azure/README.md @@ -0,0 +1,33 @@ + +## Azure-related penetration testing scripts, tools and Cheatsheets + + +- **`AzureRT`** - Powershell module implementing various cmdlets to interact with Azure and Azure AD from an offensive perspective. Helpful utilities dealing with access token based authentication, easily switching from `Az` to `AzureAD` and `az cli` interfaces, easy to use pre-made attacks such as Runbook-based command execution and more. + +Authentication & Token mechanics: + +- *`Connect-ART`* +- *`Connect-ARTAD`* +- *`Connect-ARTADServicePrincipal`* +- *`Get-ARTAccessTokenAzCli`* +- *`Get-ARTAccessTokenAz`* +- *`Get-ARTAccessTokenAzureAD`* +- *`Parse-JWTtokenRT`* +- *`Remove-ARTServicePrincipalKey`* + +Recon and Situational Awareness: + +- *`Get-ARTResource`* +- *`Get-ARTRolePermissions`* +- *`Get-ARTADRolePermissions`* +- *`Get-ARTAzRoleAssignment`* +- *`Get-ARTKeyVaultSecrets`* + +Privilege Escalation: + +- *`Add-ARTUserToGroup`* +- *`Add-ARTUserToRole`* + +Lateral Movement: + +- *`Invoke-ARTAutomationRunbook`*