Filter By

Package Types

Operating System

Categories

Trust Information

By: | 317,816 downloads | Last Updated: 11/25/2024 | Latest Version: 2.4.71.0

The Azure AD Hybrid Authentication Management module enables hybrid identity organizations (those with Active Directory on-premises) to use modern credentials for their applications and enables Azure AD to become the trusted source for both cloud and on-premises authentication.

By: | 5,296 downloads | Last Updated: 11/22/2024 | Latest Version: 2.4.71.1

The Azure AD Hybrid Authentication Management module enables hybrid identity organizations (those with Active Directory on-premises) to use modern credentials for their applications and enables Azure AD to become the trusted source for both cloud and on-premises authentication.

By: | 2,910 downloads | Last Updated: 12/17/2025 | Latest Version: 0.2.10

Set file permissions on an Azure Files share using REST API

By: | 702 downloads | Last Updated: 11/11/2025 | Latest Version: 0.0.5-beta

Interface with the Microsoft Windows Kerberos client

By: | 484 downloads | Last Updated: 4/27/2026 | Latest Version: 4.14.0-preview0001

PowerShell toolkit for assessing DES and RC4 Kerberos encryption usage in Active Directory. Discovers RC4/DES dependencies across DC encryption, trusts, KRBTGT, service accounts, KDC registry, KDCSVC events, and Security event logs — with inline remediation commands and assessment comparison for tracking progress toward the July 2026 RC4 removal de... More info

By: | 32 downloads | Last Updated: 1/22/2026 | Latest Version: 0.6.1

Kerberos keytab toolkit for AD: replication-safe extraction, password S2K (AES), robust writer/parser, compare/JSON, and DPAPI protect/unprotect.

By: | 5 downloads | Last Updated: 4/18/2026 | Latest Version: 1.0.0

Audit Kerberos posture in Active Directory: unconstrained delegation, duplicate SPNs and AS-REP roastable accounts.

By: | 4 downloads | Last Updated: 4/14/2026 | Latest Version: 2.0.0

Kerberos authentication audit toolkit — ticket cache, SPN inventory, delegation analysis, and Kerberos policy validation