Offensive Azure Versions Save

Collection of offensive tools targeting Microsoft Azure

v0.4.10

2 years ago
  • Now able to query Azure (ARM) for:
    • Subscriptions
    • Resource Groups
    • VMs
  • Able to query Azure AD (MS Graph) for:
    • User Group Membership
      • Transitive memberOf
      • Includes nested group membership
  • All added modules output multiple files, including bloodhound compatible json files

v0.4.9

2 years ago
  • Changed versioning format from X.YYY to X.Y.Z
  • Added new module to Azure_AD
    • get_groups : Takes in an ms_graph or refresh token, outputs all groups and all available group properties from MS Graph API
      • Creates condensed/raw/bloodhound json files

Full Changelog: https://github.com/blacklanternsecurity/offensive-azure/compare/v0.048...v0.4.9

v0.048

2 years ago
  • Finalized get_users Azure_AD module
    • Pulls all available users from Tenant
    • Pulls all supported user properties using Microsoft Graph API
    • outputs to three data files, including BloodHound compatible azusers type file
  • Finalized get_tenant Azure_AD module
    • Pulls tenant id from passed in token
    • Pulls tenant name (Federation Brand Name) from openid configurations (public)
    • Outputs two data files, one text file and one BloodHound compatible aztenant type file

v0.046

2 years ago
  • read_token was added under the Access_Tokens directory
    • Allows you to parse a supplied access token for included claim information
    • Checks if the token is expired
    • Attempts to validate token signature

v0.045

2 years ago
  • With this release, poetry is now supported for the modules present.
  • Once installed via poetry, each module may be ran by name:
    • poetry run device_code_easy_mode
    • poetry run token_juggle
    • poetry run outsider_recon
    • poetry run user_enum
  • You may also run the modules as you have before by cloning the repository and executing the individual scripts

v0.043

2 years ago

v0.042

2 years ago

v0.041

2 years ago

v0.04

2 years ago
  • Included pylint
    • Cleaned up code as result

v0.03

2 years ago
  • Added module for external, unauthenticated user enumeration
    • Largely a port of AADInternals Invoke-AADIntUserEnumerationAsOutsider cmdlet
  • Allows you to supply a password to be used (password spray)
  • Saves output as a json file
  • Can be found in ./User_Enum/