offensive azure
Collection of offensive tools targeting Microsoft Azure written in Python to be platform agnostic. The current list of tools can be found below with a brief description of their functionality.
- device_code_easy_mode.py
- Generates a code to be entered by the target user
- Can be used for general token generation or during a phishing/social engineering campaign.
- token_juggle.py
- Takes in a refresh token in various ways and retrieves a new refresh token and an access token for the resource specified
- read_token.py
- Takes in an access token and parses the included claims information, checks for expiration attempts to validate the signature
- outsider_recon.py
- Takes in a domain and enumerates as much information as possible about the tenant without requiring authentication
- user_enum.py
- Takes in a username or list of usernames and attempts to enumerate valid accounts using one of three methods
- Can also be used to perform a password spray
- get_tenant.py
- Takes in an access token or refresh token outputs tenant ID and tenant Name
- Creates text output file as well as BloodHound compatible aztenant file
- get_users.py
- Takes in an access token or refresh token, outputs all users in Azure AD and all available user properties in Microsoft Graph
- Creates three data files, a condensed json file, a raw json file, and a BloodHound compatible azusers file
- get_groups.py
- Takes in an access token or refresh token, outputs all groups in Azure AD and all available group properties in Microsoft Graph
- Creates three data files, a condensed json file, a raw json file, and a BloodHound compatible azgroups file
- get_group_members.py
- Takes in an access token or refresh token, outputs all group memberships in Azure AD and all available group member properties in Microsoft Graph
- Creates three data files, a condensed json file, a raw json file, and a BloodHound compatible azgroups file
- get_subscriptions.py
- Takes in an ARM token or refresh token, outputs all subscriptions in Azure and all available subscription properties in Azure Resource Manager
- Creates three data files, a condensed json file, a raw json file, and a BloodHound compatible azgroups file
- get_resource_groups.py
- Takes in an ARM token or refresh token, outputs all resource groups in Azure and all available resource group properties in Azure Resource Manager
- Creates two data files, a raw json file, and a BloodHound compatible azgroups file
- get_vms.py
- Takes in an ARM token or refresh token, outputs all virtual machines in Azure and all available VM properties in Azure Resource Manager
- Creates two data files, a raw json file, and a BloodHound compatible azgroups file
Install & Use
Copyright (C) 2022 blacklanternsecurity