nicolasblank / privileged-app-path-auditor
PublicAudit Entra ID for privilege escalation paths through application permissions, role assignments, and app ownership
A PowerShell script that audits Microsoft Entra ID tenants to detect privilege escalation paths via app registrations, service principals, and related security misconfigurations.
How It Works
You hear about this free tool that spots hidden risks in your company's Microsoft login setup, where regular users might sneak into top admin powers.
Download the zip file from GitHub and unzip it to a folder on your computer – no fancy setup needed.
Make sure you have the latest PowerShell open and the needed free add-ons installed if you don't already.
Run the tool, sign in with your work reader account through a browser pop-up, and pick a check like full scan – it safely reads your company's app ownerships.
The tool quietly checks apps, users, and permissions for dangerous paths, taking just minutes depending on your company size.
Get a clear console report or optional folder of spreadsheets with risks highlighted, direct links to your Microsoft portal, and fix-it tips.
Click the links to review owners of powerful apps, remove extras, trim permissions, or disable unused ones as guided.
Re-run the tool to confirm risks are gone, and enjoy peace of mind knowing your company's admin powers are better protected.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.