translate 2

This commit is contained in:
Carlos Polop
2025-01-01 23:55:27 +01:00
parent 4ef00e6b1b
commit 716aa06779
250 changed files with 0 additions and 250 deletions

View File

@@ -403,4 +403,3 @@ Invoke-GraphRunner -Tokens $tokens

View File

@@ -382,4 +382,3 @@ You **cannot** explicitly **deny** **access** to specific resources **using cond

View File

@@ -203,4 +203,3 @@ pprint(microsoft_office_bearer_tokens_for_graph_api)

View File

@@ -110,4 +110,3 @@ az-lateral-movement-cloud-on-prem/az-phishing-primary-refresh-token-microsoft-en

View File

@@ -150,4 +150,3 @@ Follow this link for the [**installation instructions**](https://www.powershellg

View File

@@ -66,4 +66,3 @@ This tool allows to perform several actions like register a machine in Azure AD

View File

@@ -72,4 +72,3 @@ At this point, we can gather the remaining information needed to connect to Azur

View File

@@ -40,4 +40,3 @@ Considering the storage of sensitive data in plaintext, it's crucial to secure t

View File

@@ -40,4 +40,3 @@ Main.py [-h] --usercert USERCERT --certpass CERTPASS --remoteip REMOTEIP

View File

@@ -38,4 +38,3 @@ Just navigate to login.microsoftonline.com and add the cookie **`ESTSAUTHPERSIST

View File

@@ -38,4 +38,3 @@ curl -s -H "Authorization: Bearer <token>" 'https://graph.microsoft.com/v1.0/sit

View File

@@ -50,4 +50,3 @@ Check it in the original post: [https://dirkjanm.io/obtaining-domain-admin-from-

View File

@@ -10,4 +10,3 @@ The blog post discusses a privilege escalation vulnerability in Azure AD, allowi

View File

@@ -33,4 +33,3 @@ An automatically, this user will be **synced from AzureAD to the on-prem AD user

View File

@@ -162,4 +162,3 @@ Open-AADIntOffice365Portal -ImmutableID "aodilmsic30fugCUgHxsnK==" -Issuer http:

View File

@@ -285,4 +285,3 @@ roadrecon auth --prt-cookie <cookie> --prt-context <context> --derives-key <deri

View File

@@ -8,4 +8,3 @@ To start the tests you should have access with a user with **Reader permissions