<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>entraid</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/1200/feed"/>
    <updated>2026-04-22T07:24:59+00:00</updated>
    <id>https://links.biapy.com/guest/tags/1200/feed</id>
            <entry>
            <id>https://links.biapy.com/links/11857</id>
            <title type="text"><![CDATA[ROADtools]]></title>
            <link rel="alternate" href="https://github.com/dirkjanm/ROADtools" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11857"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[(Rogue Office 365 and Azure (active) Directory tools)

A collection of Azure AD/Entra tools for offensive and defensive security purposes.

ROADtools is a framework to interact with Azure AD. It consists of a library (roadlib) with common components, the ROADrecon Azure AD exploration tool and the ROADtools Token eXchange (roadtx) tool.

Related contents:

- [STOP THE CAP: Making Entra ID Conditional Access Make Sense Offline @ SpecterOps](https://specterops.io/blog/2026/02/17/stop-the-cap-making-entra-id-conditional-access-make-sense-offline/).]]>
            </summary>
            <updated>2026-02-19T12:38:58+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/11856</id>
            <title type="text"><![CDATA[CAPSlock]]></title>
            <link rel="alternate" href="https://github.com/rbnroot/CAPSlock" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/11856"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[CAPSlock is an offline Conditional Access (CA) analysis tool built on top of a roadrecon database.
It helps defenders, auditors, and red teams understand how Conditional Access policies actually behave, not just how they are configured.

Related contents:

- [STOP THE CAP: Making Entra ID Conditional Access Make Sense Offline @ SpecterOps](https://specterops.io/blog/2026/02/17/stop-the-cap-making-entra-id-conditional-access-make-sense-offline/).]]>
            </summary>
            <updated>2026-02-19T12:38:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1545</id>
            <title type="text"><![CDATA[AADInternals.com]]></title>
            <link rel="alternate" href="https://aadinternals.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1545"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AADInternals is PowerShell module for administering Azure AD and Office 365.

- [AADInternals @ GitHub](https://github.com/Gerenios/AADInternals).
- [AADInternals documentation](https://aadinternals.com/aadinternals/).]]>
            </summary>
            <updated>2025-08-28T20:13:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4476</id>
            <title type="text"><![CDATA[Azure Active Directory Auditing Tool]]></title>
            <link rel="alternate" href="https://admindroid.com/microsoft-365-azure-ad-auditing" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4476"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AdminDroid Microsoft 365 auditing tool come up with immense reports on all the Microsoft 365 audit activities in the audit log search. Providing in-depth details on user sign-in activities is a head start for admins to analyze the users&amp;#039; sign-in data. With this Azure AD auditing tool, admins can monitor user logins, user activities, group activities, application activities, etc. Jazz up your Microsoft 365 Azure auditing without playing hard with PowerShell cmdlet like &amp;#039;Search-UnifiedAuditLog&amp;#039;.]]>
            </summary>
            <updated>2025-08-29T04:22:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4789</id>
            <title type="text"><![CDATA[MAAD Attack Framework]]></title>
            <link rel="alternate" href="https://github.com/vectra-ai-research/MAAD-AF" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4789"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An attack tool for simple, fast &amp;amp; effective security testing of M365 &amp;amp; Azure AD. 

MAAD-AF is designed to make cloud security testing simple, fast and effective. Through its virtually no-setup requirement and easy to use interactive attack modules, security teams can test their security controls, detection and response capabilities easily and swiftly.]]>
            </summary>
            <updated>2025-08-29T05:15:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5603</id>
            <title type="text"><![CDATA[Untitled Goose Tool]]></title>
            <link rel="alternate" href="https://github.com/cisagov/untitledgoosetool" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5603"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments. Untitled Goose Tool gathers additional telemetry from Microsoft Defender for Endpoint (MDE) and Defender for Internet of Things (IoT) (D4IoT).]]>
            </summary>
            <updated>2025-08-29T07:32:09+00:00</updated>
        </entry>
    </feed>
