Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hausec/PowerZure
PowerShell framework to assess Azure security
https://github.com/hausec/PowerZure
azure infosec powershell security windows
Last synced: 3 months ago
JSON representation
PowerShell framework to assess Azure security
- Host: GitHub
- URL: https://github.com/hausec/PowerZure
- Owner: hausec
- License: bsd-3-clause
- Created: 2020-01-19T22:06:44.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2024-02-12T13:16:04.000Z (9 months ago)
- Last Synced: 2024-07-27T09:33:27.820Z (3 months ago)
- Topics: azure, infosec, powershell, security, windows
- Language: PowerShell
- Homepage:
- Size: 48.7 MB
- Stars: 1,068
- Watchers: 40
- Forks: 163
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-entra - PowerZure - PowerShell project created to perform reconnaissance and exploitation of Azure, AzureAD, and the associated resources. [![stars](https://badgen.net/github/stars/hausec/PowerZure)](https://badgen.net/github/stars/hausec/PowerZure) (Tools / CLI)
- Awesome-Azure-Pentest - PowerZure - PowerShell framework to assess Azure security (Tools / Information Gathering)
- awesome-hacking-lists - hausec/PowerZure - PowerShell framework to assess Azure security (PowerShell)
README
![powerzure](https://i.imgur.com/d5B0U0B.png)
### For a list of functions, their usage, and more, check out https://powerzure.readthedocs.io
## What is PowerZure?
PowerZure is a PowerShell project created to assess and exploit resources within
Microsoft’s cloud platform, Azure. PowerZure was created out of the need for a
framework that can both perform reconnaissance **and** exploitation of Azure, EntraID, and the associated resources.## Requirements
The "Az" [Azure PowerShell](https://docs.microsoft.com/en-us/powershell/azure/?view=azps-4.2.0) module is the primary module used in PowerZure, as it handles most requests interacting with Azure resources. The Az module interacts using the Azure REST API. It can be installed via PowerShell command `Install-Module -Name Az`
## Usage
RTFM: https://powerzure.readthedocs.io
`ipmo C:\path\to\PowerZure.psd1`
If you have multiple subscriptions, you must set the main subscription with `Set-AzureSubscription`. If you do not do this, things will fail.
## Additional Resources
You can type `Get-AzureCurrentUser` to view the current signed-in user's roles in Azure and EntraID.
You can also type `Get-AzureTarget` to compare your current signed-in user's roles and their scope to resources within Azure.
For target finding, I recommend using [AzureHound](https://posts.specterops.io/introducing-bloodhound-4-0-the-azure-update-9b2b26c5e350), the Azure component to [BloodHound](https://github.com/BloodHoundAD/BloodHound).
## Author & License
Author: Ryan Hausknecht (@haus3c)
License: BSD-3