ROADtools is a framework to interact with Azure AD. It currently consists of a library (roadlib) and the ROADrecon Azure AD exploration tool.
ROADlib
ROADlib is a library that can be used to authenticate with Azure AD or to build tools that integrate with a database containing ROADrecon data. The database model in ROADlib is automatically generated based on the metadata definition of the Azure AD internal API. ROADlib lives in the ROADtools namespace, so to import it in your scripts use from roadtools.roadlib import X
ROADrecon
ROADrecon is a tool for exploring information in Azure AD from both a Red Team and Blue Team perspective. In short, this is what it does:
ROADrecon uses async
Python features and is only compatible with Python 3.6-3.8 (development is done with Python 3.8).
Installation
There are multiple ways to install ROADrecon:
Stable versions can be installed with pip install roadrecon
. This will automatically add the roadrecon
command to your PATH.
Every commit to master is automatically built into a release version with Azure Pipelines. This ensures that you can install the latest version of the GUI without having to install npm
and all it’s dependencies. Simply download the roadlib
and roadrecon
zip files from the Azure Pipelines artifacts, then unzip both and install them in the correct order (roadlib
first):
pip install roadlib/
pip install roadrecon/
You can also install them in development mode with pip install -e roadlib/
.
If you want to make changes to the Angular front-end, you will need to have node
and npm
installed. Then install the components from git:
git clone https://github.com/dirkjanm/roadtools.git
pip install -e roadlib/
pip install -e roadrecon/
cd roadrecon/frontend/
npm install
You can run the Angular frontend with npm start
or ng serve
using the Angular CLI from the roadrecon/frontend/
directory. To build the JavaScript files into ROADrecon’s dist_gui
directory, run npm build
.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…