Added AzureRT

This commit is contained in:
mgeeky 2022-01-22 16:25:11 +01:00
parent ec6f30a230
commit 787d12ba63
3 changed files with 37 additions and 0 deletions

3
.gitmodules vendored
View File

@ -55,3 +55,6 @@
[submodule "phishing/decode-spam-headers"] [submodule "phishing/decode-spam-headers"]
path = phishing/decode-spam-headers path = phishing/decode-spam-headers
url = https://github.com/mgeeky/decode-spam-headers url = https://github.com/mgeeky/decode-spam-headers
[submodule "clouds/azure/AzureRT"]
path = clouds/azure/AzureRT
url = https://github.com/mgeeky/AzureRT

1
clouds/azure/AzureRT Submodule

@ -0,0 +1 @@
Subproject commit b3364cb84dd8758c3b65690a10c3a0475738790b

33
clouds/azure/README.md Normal file
View File

@ -0,0 +1,33 @@
## Azure-related penetration testing scripts, tools and Cheatsheets
- **`AzureRT`** - Powershell module implementing various cmdlets to interact with Azure and Azure AD from an offensive perspective. Helpful utilities dealing with access token based authentication, easily switching from `Az` to `AzureAD` and `az cli` interfaces, easy to use pre-made attacks such as Runbook-based command execution and more.
Authentication & Token mechanics:
- *`Connect-ART`*
- *`Connect-ARTAD`*
- *`Connect-ARTADServicePrincipal`*
- *`Get-ARTAccessTokenAzCli`*
- *`Get-ARTAccessTokenAz`*
- *`Get-ARTAccessTokenAzureAD`*
- *`Parse-JWTtokenRT`*
- *`Remove-ARTServicePrincipalKey`*
Recon and Situational Awareness:
- *`Get-ARTResource`*
- *`Get-ARTRolePermissions`*
- *`Get-ARTADRolePermissions`*
- *`Get-ARTAzRoleAssignment`*
- *`Get-ARTKeyVaultSecrets`*
Privilege Escalation:
- *`Add-ARTUserToGroup`*
- *`Add-ARTUserToRole`*
Lateral Movement:
- *`Invoke-ARTAutomationRunbook`*