Not The Hidden Wiki
- The Most Dangerous Entra Role - link
- Azure AD Kerberos Tickets: Pivoting to the Cloud - link
- Obtaining Domain Admin from Azure AD - link
- Untangling Azure Active Directory Permissions II: Privileged Access - link
- Azure services that can use managed identities to access other services - link
- How to install the Azure CLI - link
- Cloud - Azure Pentest - link
- Preventing Exposed Azure Blob Storage - link
- Open Azure blobs search on grayhatwarfare.com and other updates - link
- Introducing Project Freta: Toward trusted sensing for the cloud. link
- Finding Azurescape: Cross-Account Container Takeover in Azure Container Instances - link
- Azure Monitor: link
- Reference list of Azure domains (not comprehensive) - link
- The ultimate Entra ID (Azure AD) / Microsoft 365 hacking blog - link
- Dirkjanm Blog - link
- Abusing Azure AD SSO with the Primary Refresh Token - link
- Abusing dynamic groups in Azure AD for Privilege Escalation - link
- Attacking Azure, Azure AD, and Introducing PowerZure - link
- Attacking Azure & Azure AD, Part II - link
- Azure AD Connect for Red Teamers - link
- Azure AD Introduction for Red Teamers - link
- Azure AD Pass The Certificate - link
- Azure AD privilege escalation - Taking over default application permissions as Application Admin: - link
- Defense and Detection for Attacks Within Azure - link
- Hunting Azure Admins for Vertical Escalation - link
- Impersonating Office 365 Users With Mimikatz - link
- Lateral Movement from Azure to On-Prem AD - link
- Malicious Azure AD Application Registrations - link
- Moving laterally between Azure AD joined machines - link
- CrowdStrike Launches Free Tool to Identify and Help Mitigate Risks in Azure Active Directory - link
- Privilege Escalation Vulnerability in Azure Functions - link
- Azure Application Proxy C2 - link
- Recovering Plaintext Passwords from Azure Virtual Machines like It’s the 1990s - link
- Forensicating Azure VMs - link
- Network Forensics on Azure VMs - link
- Azure Active Directory password brute-forcing flaw - link
- How to Detect Azure Active Directory Backdoors: Identity Federation - link
- Azure App Service vulnerability exposed hundreds of source code repositories - link
- AutoWarp: Cross-Account Vulnerability in Microsoft Azure Automation Service - link
- Microsoft Azure Synapse Pwnalytics - link
- Microsoft Azure Site Recovery DLL Hijacking - link
- FabriXss (CVE-2022-35829): Abusing a Custom Role User Using CSTI and Stored XSS in Azure Fabric Explorer - link
- Untangling Azure Active Directory Principals & Access Permissions - link
- How to Detect OAuth Access Token Theft in Azure - link
- How to deal with Ransomware on Azure - link
- How Orca found Server-Side Request Forgery (SSRF) Vulnerabilities in four different Azure Services - link
- EmojiDeploy: Smile! Your Azure web service just got RCE’d - link
- Bounce the Ticket and Silver Iodide on Azure AD Kerberos - link
- This publication is a collection of various common attack scenarios on Microsoft Entra ID - link
- ThreatModel for Azure Storage - link