vectra-ai-research/MAAD-AF
Fork: 47 Star: 300 (更新于 1970-01-01 00:00:00)
license: GPL-3.0
Language: PowerShell .
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Azure AD.
最后发布版本: v1.1 ( 2023-09-16 16:26:46)
MAAD Attack Framework
MAAD-AF is an open-source cloud attack tool for Microsoft 365 & Entra ID(Azure AD) environments.
MAAD-AF is designed to make cloud security testing simple, fast and effective. Through its virtually no-setup requirement and easy to use interactive attack modules, security teams can test their security controls, detection and response capabilities easily and swiftly.
MAAD-AF is completely developed in PowerShell.
Features
- Post-compromise techniques
- Simple interactive use
- Revert actions for clean testing
- Virtually no-setup requirements
- Attack modules for Entra ID (Azure AD)
- Attack modules for Exchange
- Attack modules for Teams
- Attack modules for SharePoint
- Attack modules for eDiscovery
MAAD-AF Modules
- Recon data from various services & data stores
- Backdoor Account Setup
- Trusted Network Modification
- Mailbox Audit Bypass
- Disable Anti-Phishing in Exchange
- Mailbox Deletion Rule Setup
- Exfiltration through Mail Forwarding
- Gain User Mailbox Access
- Setup External Teams Access
- Exploit Cross Tenant Synchronization
- eDiscovery exploitation for data recon & exfil
- Bruteforce credentials
- MFA Manipulation
- User Account Deletion
- SharePoint exploitation for data recon & exfil
- Many more...
Getting Started
Plug & Play - It's that easy!
- Clone or download the MAAD-AF github repo to your windows host
- Open PowerShell as Administrator
- Navigate to the local MAAD-AF directory
- Run MAAD_Attack.ps1
> git clone https://github.com/vectra-ai-research/MAAD-AF.git
> cd /MAAD-AF
> ./MAAD_Attack.ps1
Requirements
- Internet accessible Windows host.
- PowerShell (version 5) with local administrator permissions.
- All external powershell modules required will be installed automatically.
Contribute
- Thank you for considering contributing to MAAD-AF!
- Your contributions will help make MAAD-AF better.
- Join the mission to make security testing simple, fast and effective.
- Submit a PR to the main branch to contribute to MAAD-AF.
Report Bugs
- Submit bugs or other issues related to the tool directly in the "Issues" section
Request Features
- Share those great ideas. Submit new features by submitting a PR or sharing them in GitHub Discussions.
Contact
- If you found this tool useful, want to share an interesting use-case, bring issues to attention, whatever the reason - share them. You can email at: maad-af@vectra.ai or post it in Discussions on GitHub.
最近版本更新:(数据更新于 1970-01-01 00:00:00)
2023-09-16 16:26:46 v1.1
主题(topics):
adversary-emulation, azuread, cloud-administration, cloud-security, entra-id, identity-access-management, microsoft, microsoft-azure-security, microsoft-graph, microsoft365, mitre, powershell, red-team, security, security-testing, ttp
vectra-ai-research/MAAD-AF同语言 PowerShell最近更新仓库
2024-12-06 11:27:32 ChrisTitusTech/winutil
2024-11-18 03:45:03 ntdevlabs/tiny11builder
2024-09-24 22:59:06 jenkinsci/docker
2024-08-04 15:03:04 dataplat/dbatools
2024-07-19 04:02:17 actions/runner-images
2024-07-10 01:57:58 dotnet/core