ROADTools is a powerful framework designed for exploring and interacting with Microsoft Azure Active Directory (Azure AD). It is widely used by both Red Team and Blue Team security professionals to assess, analyze, and secure Azure AD environments. ROADTools consists of two main components: ROADlib and ROADrecon.
ROADlib is the foundational library of ROADTools. It allows you to:
The database model in ROADlib is automatically generated based on the Azure AD internal API metadata, ensuring accurate and up-to-date mappings of Azure AD objects. ROADlib can be easily imported in Python using:
from roadtools.roadlib import X
This library is fully compatible with Python 3.9 and above, leveraging modern asynchronous features for fast and efficient data processing.
ROADrecon is a dedicated tool for in-depth exploration of Azure AD environments. It provides insights that are valuable for both offensive security testing (Red Team) and defensive monitoring (Blue Team).
Key features:
The easiest method is using pip:
pip install roadrecon
This command also adds the roadrecon
CLI tool to your PATH, enabling quick command-line access.
For the latest development versions:
git clone https://github.com/dirkjanm/ROADtools.git
pip install -e roadlib/
pip install -e roadrecon/
This approach allows you to stay up-to-date with the latest features and fixes.
To customize the Angular front-end:
cd roadrecon/frontend/
npm install
npm start
npm run build
You can access ROADTools directly from its official GitHub repository, where you’ll find the latest versions, documentation, and installation instructions:
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…