{"id":37277,"date":"2025-03-25T11:25:04","date_gmt":"2025-03-25T11:25:04","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=37277"},"modified":"2025-03-25T11:25:06","modified_gmt":"2025-03-25T11:25:06","slug":"cloudpeass","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/","title":{"rendered":"CloudPEASS : Cloud Privilege Escalation Awesome Script Suite"},"content":{"rendered":"\n<p><a href=\"https:\/\/kalilinuxtutorials.com\/tag\/cloudpeass\/\" target=\"_blank\" rel=\"noreferrer noopener\">CloudPEASS <\/a>is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS. <\/p>\n\n\n\n<p>The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>AzurePEASS<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Functionality:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Permission Analysis:<\/strong> AzurePEASS checks all permissions in Azure and Entra ID to find privilege escalation paths and other potential attacks.<\/li>\n\n\n\n<li><strong>API Utilization:<\/strong> It uses ARM and Graph API endpoints to gather resource permissions and check Entra ID permissions across different scopes.<\/li>\n\n\n\n<li><strong>Token Requirements:<\/strong> Users need to provide tokens for both ARM and Graph APIs.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Usage:<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Obtain necessary tokens using Azure CLI commands.<\/li>\n\n\n\n<li>Run AzurePEASS with the tokens provided via command line or environment variables.<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-preformatted\">bash<code><em># Example usage<\/em><br>export AZURE_ARM_TOKEN=$(az account get-access-token --resource-type arm | jq -r .accessToken)<br>export AZURE_GRAPH_TOKEN=$(az account get-access-token --resource-type ms-graph | jq -r .accessToken)<br>python3 AzurePEASS.py [--arm-token &lt;AZURE_MANAGEMENT_TOKEN>] [--graph-token &lt;AZURE_GRAPH_TOKEN>]<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>GCPPEASS<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Functionality:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Permission Analysis:<\/strong> GCPPEASS enumerates permissions in GCP and searches for privilege escalation paths and other attacks.<\/li>\n\n\n\n<li><strong>Brute Force Approach:<\/strong> It brute forces permissions across projects, folders, and organizations to minimize false negatives.<\/li>\n\n\n\n<li><strong>Resource Enumeration:<\/strong> Attempts to list VMs, <a href=\"https:\/\/github.com\/carlospolop\/CloudPEASS\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Storages<\/a>, Functions, and Service Accounts to check permissions.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Usage:<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Obtain a token using <code>gcloud auth print-access-token<\/code>.<\/li>\n\n\n\n<li>Run GCPPEASS with the token provided via command line or environment variable.<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-preformatted\">bash<code><em># Example usage<\/em><br>export CLOUDSDK_AUTH_ACCESS_TOKEN=$(gcloud auth print-access-token)<br>python3 GCPPEASS.py [--token &lt;TOKEN>]<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Features<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>HackTricks AI Integration:<\/strong> Both tools can use HackTricks AI to analyze permissions, though users can opt out with the <code>--not-use-hacktricks-ai<\/code> flag.<\/li>\n\n\n\n<li><strong>Output Customization:<\/strong> Results can be saved to a JSON file for further analysis.<\/li>\n\n\n\n<li><strong>Multithreading:<\/strong> Supports multithreading to improve performance.<\/li>\n<\/ul>\n\n\n\n<p>CloudPEASS is a powerful toolset for cloud security auditing, helping users identify and mitigate potential security risks in their cloud environments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CloudPEASS is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS. The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks. AzurePEASS Functionality: [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":37283,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,25,5840],"tags":[7277,737,6321,6052,6325],"class_list":["post-37277","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-hacking-tools","category-penetration-testing-tools","tag-cloudpeass","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CloudPEASS : Cloud Privilege Escalation Awesome Script Suite<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CloudPEASS : Cloud Privilege Escalation Awesome Script Suite\" \/>\n<meta property=\"og:description\" content=\"CloudPEASS is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS. The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks. AzurePEASS Functionality: [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-25T11:25:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T11:25:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"CloudPEASS : Cloud Privilege Escalation Awesome Script Suite\",\"datePublished\":\"2025-03-25T11:25:04+00:00\",\"dateModified\":\"2025-03-25T11:25:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/\"},\"wordCount\":263,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp\",\"keywords\":[\"CloudPEASS\",\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\",\"Hacking Tools\",\"Pentesting Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/\",\"name\":\"CloudPEASS : Cloud Privilege Escalation Awesome Script Suite\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp\",\"datePublished\":\"2025-03-25T11:25:04+00:00\",\"dateModified\":\"2025-03-25T11:25:06+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp\",\"width\":1600,\"height\":900},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CloudPEASS : Cloud Privilege Escalation Awesome Script Suite","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/","og_locale":"en_US","og_type":"article","og_title":"CloudPEASS : Cloud Privilege Escalation Awesome Script Suite","og_description":"CloudPEASS is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS. The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks. AzurePEASS Functionality: [&hellip;]","og_url":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-03-25T11:25:04+00:00","article_modified_time":"2025-03-25T11:25:06+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp","type":"image\/webp"}],"author":"Varshini","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"CloudPEASS : Cloud Privilege Escalation Awesome Script Suite","datePublished":"2025-03-25T11:25:04+00:00","dateModified":"2025-03-25T11:25:06+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/"},"wordCount":263,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp","keywords":["CloudPEASS","cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security","Hacking Tools","Pentesting Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/cloudpeass\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/","url":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/","name":"CloudPEASS : Cloud Privilege Escalation Awesome Script Suite","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp","datePublished":"2025-03-25T11:25:04+00:00","dateModified":"2025-03-25T11:25:06+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/cloudpeass\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/cloudpeass\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp","width":1600,"height":900},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/CloudPEASS-.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":19873,"url":"https:\/\/kalilinuxtutorials.com\/peass-ng\/","url_meta":{"origin":37277,"position":0},"title":"PEASS-ng : Privilege Escalation Awesome Scripts SUITE new generation","author":"R K","date":"November 5, 2021","format":false,"excerpt":"PEASS-ng is a Privilege Escalation Awesome Scripts SUITE new generation. Here you will find\u00a0privilege escalation tools for Windows and Linux\/Unix* and MacOS. These tools search for possible\u00a0local privilege escalation paths\u00a0that you could exploit and print them to you\u00a0with nice colors\u00a0so you can recognize the misconfigurations easily. Check the\u00a0Local Windows Privilege\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg6nSyfuQUypdKGF3bYEFxf_VRAmA3rtm3evMNyX44xXblU5qmo8ap5WadGM1Hn8ivbifNRo46xA2w5XzWIETdNYTHIXNvypMlzptFr55XNd7b4JrQ1I4EDcXq13DI3MitDCU-GpxuxnmE8BVw6FvzWD-VnOuhTCjLL54-Ss45eU9rysHaDrrvt4yln=s1218","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg6nSyfuQUypdKGF3bYEFxf_VRAmA3rtm3evMNyX44xXblU5qmo8ap5WadGM1Hn8ivbifNRo46xA2w5XzWIETdNYTHIXNvypMlzptFr55XNd7b4JrQ1I4EDcXq13DI3MitDCU-GpxuxnmE8BVw6FvzWD-VnOuhTCjLL54-Ss45eU9rysHaDrrvt4yln=s1218 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg6nSyfuQUypdKGF3bYEFxf_VRAmA3rtm3evMNyX44xXblU5qmo8ap5WadGM1Hn8ivbifNRo46xA2w5XzWIETdNYTHIXNvypMlzptFr55XNd7b4JrQ1I4EDcXq13DI3MitDCU-GpxuxnmE8BVw6FvzWD-VnOuhTCjLL54-Ss45eU9rysHaDrrvt4yln=s1218 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg6nSyfuQUypdKGF3bYEFxf_VRAmA3rtm3evMNyX44xXblU5qmo8ap5WadGM1Hn8ivbifNRo46xA2w5XzWIETdNYTHIXNvypMlzptFr55XNd7b4JrQ1I4EDcXq13DI3MitDCU-GpxuxnmE8BVw6FvzWD-VnOuhTCjLL54-Ss45eU9rysHaDrrvt4yln=s1218 2x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg6nSyfuQUypdKGF3bYEFxf_VRAmA3rtm3evMNyX44xXblU5qmo8ap5WadGM1Hn8ivbifNRo46xA2w5XzWIETdNYTHIXNvypMlzptFr55XNd7b4JrQ1I4EDcXq13DI3MitDCU-GpxuxnmE8BVw6FvzWD-VnOuhTCjLL54-Ss45eU9rysHaDrrvt4yln=s1218 3x"},"classes":[]},{"id":36223,"url":"https:\/\/kalilinuxtutorials.com\/hackthebox-ad-machines\/","url_meta":{"origin":37277,"position":1},"title":"HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"HackTheBox (HTB) offers a range of Active Directory (AD) machines designed to help cybersecurity enthusiasts and professionals practice enumeration, exploitation, and attack techniques on AD environments. These machines vary in difficulty, providing challenges for both beginners and advanced users. Below is an overview of tools commonly used for tackling AD\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10365,"url":"https:\/\/kalilinuxtutorials.com\/peass\/","url_meta":{"origin":37277,"position":2},"title":"PEASS &#8211; Privilege Escalation Awesome Scripts SUITE","author":"R K","date":"April 23, 2020","format":false,"excerpt":"Here you will find PEASS privilege escalation tools for Windows and Linux\/Unix* (in some near future also for Mac). These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily. Check the Local\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31572,"url":"https:\/\/kalilinuxtutorials.com\/adokit\/","url_meta":{"origin":37277,"position":3},"title":"ADOKit: Azure DevOps Services Attack Toolkit","author":"Varshini","date":"December 22, 2023","format":false,"excerpt":"Azure DevOps Services Attack Toolkit - ADOKit is a toolkit that can be used to attack Azure DevOps Services by taking advantage of the available REST API. The tool allows the user to specify an attack module, along with specifying valid credentials (API key or stolen authentication cookie) for the\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjI349rqvQZF2RZXwNhlK7-k3UABRMANHxxLXTfCRnpeyPz4dIUrAjfQbpcuCpHqBEy4lAXNI60BTiKbfi70afkc62TFGnAeHmZiNr_b1BfoB7uVOARc5X-n1uUlJb8RfEQaFf95s2wIS9gZPcrRLsc2wHyagVR6OTV_R_i_DEl08HDz842IVK-jDsVhQ\/s16000\/ADOKit.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjI349rqvQZF2RZXwNhlK7-k3UABRMANHxxLXTfCRnpeyPz4dIUrAjfQbpcuCpHqBEy4lAXNI60BTiKbfi70afkc62TFGnAeHmZiNr_b1BfoB7uVOARc5X-n1uUlJb8RfEQaFf95s2wIS9gZPcrRLsc2wHyagVR6OTV_R_i_DEl08HDz842IVK-jDsVhQ\/s16000\/ADOKit.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjI349rqvQZF2RZXwNhlK7-k3UABRMANHxxLXTfCRnpeyPz4dIUrAjfQbpcuCpHqBEy4lAXNI60BTiKbfi70afkc62TFGnAeHmZiNr_b1BfoB7uVOARc5X-n1uUlJb8RfEQaFf95s2wIS9gZPcrRLsc2wHyagVR6OTV_R_i_DEl08HDz842IVK-jDsVhQ\/s16000\/ADOKit.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjI349rqvQZF2RZXwNhlK7-k3UABRMANHxxLXTfCRnpeyPz4dIUrAjfQbpcuCpHqBEy4lAXNI60BTiKbfi70afkc62TFGnAeHmZiNr_b1BfoB7uVOARc5X-n1uUlJb8RfEQaFf95s2wIS9gZPcrRLsc2wHyagVR6OTV_R_i_DEl08HDz842IVK-jDsVhQ\/s16000\/ADOKit.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31632,"url":"https:\/\/kalilinuxtutorials.com\/windows-privilege-escalation\/","url_meta":{"origin":37277,"position":4},"title":"Windows Local Privilege Escalation Cookbook (In Progress)","author":"Varshini","date":"January 4, 2024","format":false,"excerpt":"Description (Keynote) This Cookbook was created with the main purpose of helping people understand local privilege escalation techniques on Windows environments. Moreover, it can be used for both attacking and defensive purposes. \u2139\ufe0f This Cookbook focuses only on misconfiguration vulnerabilities on Windows workstations\/servers\/machines. Evasion techniques to bypass security protections, endpoints,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHMH9l6J9a6Y6JQngxQvbAprG32hI0ZY0vC-wPckn5-rkwbI9xCTGv8UFY1lofk70CMxDHhZC7N6Q7jW7BIbAGDC3wqLQu570vmRk5wQDKuhZ6hHBAaOzyRxNm3jyIQO2hx7LnY43rt5kPdb764PKjQumczIbjjIkCnOihc0vNILeXm-cb4Lh9QSFb0w\/s16000\/Windows%20Local%20Privilege.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHMH9l6J9a6Y6JQngxQvbAprG32hI0ZY0vC-wPckn5-rkwbI9xCTGv8UFY1lofk70CMxDHhZC7N6Q7jW7BIbAGDC3wqLQu570vmRk5wQDKuhZ6hHBAaOzyRxNm3jyIQO2hx7LnY43rt5kPdb764PKjQumczIbjjIkCnOihc0vNILeXm-cb4Lh9QSFb0w\/s16000\/Windows%20Local%20Privilege.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHMH9l6J9a6Y6JQngxQvbAprG32hI0ZY0vC-wPckn5-rkwbI9xCTGv8UFY1lofk70CMxDHhZC7N6Q7jW7BIbAGDC3wqLQu570vmRk5wQDKuhZ6hHBAaOzyRxNm3jyIQO2hx7LnY43rt5kPdb764PKjQumczIbjjIkCnOihc0vNILeXm-cb4Lh9QSFb0w\/s16000\/Windows%20Local%20Privilege.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHMH9l6J9a6Y6JQngxQvbAprG32hI0ZY0vC-wPckn5-rkwbI9xCTGv8UFY1lofk70CMxDHhZC7N6Q7jW7BIbAGDC3wqLQu570vmRk5wQDKuhZ6hHBAaOzyRxNm3jyIQO2hx7LnY43rt5kPdb764PKjQumczIbjjIkCnOihc0vNILeXm-cb4Lh9QSFb0w\/s16000\/Windows%20Local%20Privilege.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":29772,"url":"https:\/\/kalilinuxtutorials.com\/badzure\/","url_meta":{"origin":37277,"position":5},"title":"BadZure &#8211; A PowerShell To Set Up Azure Active Directory Tenants","author":"Varshini","date":"August 29, 2023","format":false,"excerpt":"BadZure is a PowerShell script that uses the Microsoft Graph SDK to set up Azure Active Directory tenants. It fills them with different entities and makes common security mistakes to make tenants that are easy to attack and have multiple entry points. BadZure automates the process of creating users, groups,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj3izlZmD-MoCKsQHph97rMIJD-sfi0Z_dj175LNW7XlNNLmXbAOvuKYOlSnC1jiwzLgtHawnSenALT-kki82sH3U3zmdYoZEUq9YGMfIPHSxe0NTuPEfEU6EbGGOeD1BbHXNQdeLt8JpcMXvVY6Ne6UPl6aGTq09Dgr5-CrgZirUEXhoVXZd93UAz2-U_z\/s16000\/ivanti%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj3izlZmD-MoCKsQHph97rMIJD-sfi0Z_dj175LNW7XlNNLmXbAOvuKYOlSnC1jiwzLgtHawnSenALT-kki82sH3U3zmdYoZEUq9YGMfIPHSxe0NTuPEfEU6EbGGOeD1BbHXNQdeLt8JpcMXvVY6Ne6UPl6aGTq09Dgr5-CrgZirUEXhoVXZd93UAz2-U_z\/s16000\/ivanti%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj3izlZmD-MoCKsQHph97rMIJD-sfi0Z_dj175LNW7XlNNLmXbAOvuKYOlSnC1jiwzLgtHawnSenALT-kki82sH3U3zmdYoZEUq9YGMfIPHSxe0NTuPEfEU6EbGGOeD1BbHXNQdeLt8JpcMXvVY6Ne6UPl6aGTq09Dgr5-CrgZirUEXhoVXZd93UAz2-U_z\/s16000\/ivanti%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj3izlZmD-MoCKsQHph97rMIJD-sfi0Z_dj175LNW7XlNNLmXbAOvuKYOlSnC1jiwzLgtHawnSenALT-kki82sH3U3zmdYoZEUq9YGMfIPHSxe0NTuPEfEU6EbGGOeD1BbHXNQdeLt8JpcMXvVY6Ne6UPl6aGTq09Dgr5-CrgZirUEXhoVXZd93UAz2-U_z\/s16000\/ivanti%20%281%29.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/37277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=37277"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/37277\/revisions"}],"predecessor-version":[{"id":37284,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/37277\/revisions\/37284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/37283"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=37277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=37277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=37277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}