mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-11-25 12:01:37 +01:00
37 lines
1.1 KiB
Markdown
37 lines
1.1 KiB
Markdown
|
|
## Azure-related penetration testing scripts, tools and Cheatsheets
|
|
|
|
|
|
- **`AzureRT`** - Powershell module implementing various cmdlets to interact with Azure and Azure AD from an offensive perspective. Helpful utilities dealing with access token based authentication, easily switching from `Az` to `AzureAD` and `az cli` interfaces, easy to use pre-made attacks such as Runbook-based command execution and more.
|
|
|
|
Authentication & Token mechanics:
|
|
|
|
- *`Get-ARTWhoami`*
|
|
- *`Connect-ART`*
|
|
- *`Connect-ARTAD`*
|
|
- *`Connect-ARTADServicePrincipal`*
|
|
- *`Get-ARTAccessTokenAzCli`*
|
|
- *`Get-ARTAccessTokenAz`*
|
|
- *`Get-ARTAccessTokenAzureAD`*
|
|
- *`Parse-JWTtokenRT`*
|
|
- *`Remove-ARTServicePrincipalKey`*
|
|
|
|
Recon and Situational Awareness:
|
|
|
|
- *`Get-ARTAccess`*
|
|
- *`Get-ARTADAccess`*
|
|
- *`Get-ARTResource`*
|
|
- *`Get-ARTRolePermissions`*
|
|
- *`Get-ARTADRolePermissions`*
|
|
- *`Get-ARTRoleAssignment`*
|
|
- *`Get-ARTKeyVaultSecrets`*
|
|
|
|
Privilege Escalation:
|
|
|
|
- *`Add-ARTUserToGroup`*
|
|
- *`Add-ARTUserToRole`*
|
|
|
|
Lateral Movement:
|
|
|
|
- *`Invoke-ARTAutomationRunbook`*
|