# AzureRedTeam - PowerShell

[![Contributor Covenant](https://img.shields.io/badge/Contributor%20Covenant-2.1-4baaaa.svg)](https://github.com/dafneb/.github/blob/main/.github/CODE_OF_CONDUCT.md) [![License](https://img.shields.io/badge/License-MIT-4baaaa.svg)](https://github.com/dafneb/.github/blob/main/LICENSE) ![GitHub Release](https://img.shields.io/github/v/release/dafneb/AzureRedTeamByPowershell) ![GitHub commit activity](https://img.shields.io/github/commit-activity/w/dafneb/AzureRedTeamByPowershell) ![GitHub contributors](https://img.shields.io/github/contributors/dafneb/AzureRedTeamByPowershell)

![GitHub Actions Workflow Status](https://img.shields.io/github/actions/workflow/status/dafneb/AzureRedTeamByPowershell/powershell-analyzer.yml?label=PSScriptAnalyzer) ![GitHub Actions Workflow Status](https://img.shields.io/github/actions/workflow/status/dafneb/AzureRedTeamByPowershell/codeql.yml?label=CodeQL) [![pre-commit.ci status](https://results.pre-commit.ci/badge/github/dafneb/AzureRedTeamByPowershell/main.svg)](https://results.pre-commit.ci/latest/github/dafneb/AzureRedTeamByPowershell/main)

This repository contains a set of PowerShell scripts to help red teamers and pentesters to enumerate and test Microsoft 365, Entra ID and Azure environments.

## Scripts organization

* ./scripts/private -> Scripts for usage when you have access to the target environment.
* ./scripts/public -> Scripts for usage against the target environment without access (e.g. from the internet via service's endpoints).

## Disclaimer

{% hint style="warning" %}
Scripts are provided for educational purposes only. Use them at your own risk. The author is not responsible for any damage caused by the use of these scripts. Please ensure you have permission to test the target environment before using these scripts.
{% endhint %}

## Contributing

If you want to contribute to this project, please read the [Code\_of\_Conduct](https://github.com/dafneb/.github/blob/main/.github/CODE_OF_CONDUCT.md).

## Security

[Security Policy](https://github.com/dafneb/.github/blob/main/SECURITY.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://dafneb.gitbook.io/azureredteambypowershell/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
