Unauthenticated Recon
Attacking
List of publically exposed APIs
API
Information
AADInternals function
DNS Suffixes
Determine if company is using AzureAD


Enumerate Commands

AzureAD Attack Tools
Detecting/Defending
Is and Isn't detected
Logging Location

Last updated
