Collection of tools for attacking Microsoft Cloud products
Project description
Collection of offensive tools targeting Microsoft Azure written in Python to be platform agnostic. The current list of tools can be found below with a brief description of their functionality.
./Device_Code/device_code_easy_mode.py
- Generates a code to be entered by the target user
- Can be used for general token generation or during a phishing/social engineering campaign.
./Access_Tokens/token_juggle.py
- Takes in a refresh token in various ways and retrieves a new refresh token and an access token for the resource specified
./Outsider_Recon/outsider_recon.py
- Takes in a domain and enumerates as much information as possible about the tenant without requiring authentication
./User_Enum/user_enum.py
- Takes in a username or list of usernames and attempts to enumerate valid accounts using one of three methods
- Can also be used to perform a password spray
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
offensive_azure-0.45.tar.gz
(26.6 kB
view hashes)
Built Distribution
Close
Hashes for offensive_azure-0.45-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 41be4fd35dffb389b9b9fdb5725a00c9e805e4423ee792f2e6dadbf1f8b2930a |
|
MD5 | 60b00806853b5f1a1d3a6dbaadf27083 |
|
BLAKE2b-256 | 0da98fbd3f3e9bc57e48e3c81e7a46d818cb48ae56eeb0725c0671d205389a2c |