Skip to content

Commit 1fb9eab

Browse files
authored
Revise README with new Azure AD tools and formatting
Updated README to include new scripts and improved formatting.
1 parent 0a26840 commit 1fb9eab

File tree

1 file changed

+19
-4
lines changed

1 file changed

+19
-4
lines changed

README.md

Lines changed: 19 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ PowerShell-Scripts/
1414
│ └── DisableWindowsDefender.ps1
1515
│ └── kickoff.ps1
1616
│ └── SetAdaptorMetricWired_Highest.ps1
17+
1718
## ── 📂 ├── Azure Active Directory/
1819
│ └── get_az_token.ps1
1920
│ └── aadinternals_audit6.ps1 (Uses AADInternals)
@@ -22,13 +23,14 @@ PowerShell-Scripts/
2223
│ └── sendmail.py
2324
│ └── Check-AllPowerfulAzurePerms3.ps1
2425
│ └── enum_entra_admins.ps1 & find_disabled_ad_accounts.ps1
25-
│ └── ** Azure AD application auditing tools **
26+
│ └── watch_X_job3.ps1
27+
│ └── Audit-AllUsersRolePerms.ps1
28+
│ └── 👉** Azure AD application auditing tools **
2629
list_all_applications2.ps1
2730
BulkMultiPermExploitability2.ps1
2831
Profile-App.ps1
2932
Audit-AppDelegationRisks.ps1
30-
│ └── Audit-AllUsersRolePerms.ps1
31-
│ └── ** automate creation of malicious-looking OAuth authorization flows (device‑code and consent URLs) used in consent‑phishing simulations **
33+
│ └── 👉** automate creation of malicious-looking OAuth authorization flows (device‑code and consent URLs) used in consent‑phishing simulations **
3234
│ generate_oauth_phishing_url_pwnd2.ps1
3335
│ generate_oauth_phishing_url_MS_App2.ps1
3436
│ generate_oauth_phishing_url2.ps1
@@ -179,7 +181,7 @@ It will produce a spreadsheet file named DisabledAccounts_Report.csv
179181
Admins should investigate these files and clean up their AD/AAD as needed.
180182

181183
---
182-
**list_all_applications2.ps1 & .BulkMultiPermExploitability2ps1 & Profile-App.ps1 & Audit-AppDelegationRisks.ps1**
184+
👉** Azure AD application auditing tools **
183185

184186
### `list_all_applications2.ps1`
185187
- **Purpose:** Enumerates every registered application and service principal in an Entra ID tenant.
@@ -226,6 +228,8 @@ Use like so:
226228
`.\Audit-AllUsersRolePerms.ps1`
227229

228230
---
231+
👉** automate creation of malicious-looking OAuth authorization flows (device‑code and consent URLs) used in consent‑phishing simulations **
232+
229233
### `generate_oauth_phishing_url_pwnd2.ps1`
230234

231235
Produces preconfigured phishing payloads and tracking for “pwnd” style scenarios where the script automates the device‑code flow lifecycle (create code, deliver to victim, poll for token).
@@ -240,6 +244,17 @@ Builds phishing URLs that impersonate or reuse Microsoft‑branded client IDs an
240244

241245
Generates OAuth device‑code or authorization URLs and associated tracking artifacts that an attacker could deliver to a target to induce them to approve an OAuth consent prompt.
242246

247+
---
248+
### `watch_X_job3.ps1`
249+
250+
Use like so:
251+
`.\watch_X_job3.ps1 -ResourceGroupName 'XXX-Hybrid-Automation' -AutomationAccountName 'XXX-Cybersecurity-Automation' -RunbookName pwned`
252+
or
253+
`$job = Start-AzAutomationRunbook -ResourceGroupName 'XXX-Hybrid-Automation' -AutomationAccountName 'XXX-Cybersecurity-Automation' -Name 'pwned' -RunOn 'xxxGroup'
254+
255+
.\watch_X_job3.ps1 -ResourceGroupName 'XXX-Hybrid-Automation' -AutomationAccountName 'XXX-Cybersecurity-Automation' -RunbookName pwned -JobId $job.JobId`
256+
257+
243258
## ── 📂 Section: On-Prem Active Directory ──
244259
---
245260
### `ad_object_permissions3.ps1`

0 commit comments

Comments
 (0)