SCIM Endpoint Tester
Automated SCIM 2.0 compliance testing against any identity provider endpoint. Tests CRUD operations, filtering, pagination, and error handling.
The Definitive Chronicle of Identity & Access Management
BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpoint
CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediately
BREACH: European fintech platform leaks OAuth tokens affecting 890K users
Battle-tested scripts, analyzers, and utilities built by Paulo for identity professionals
These tools are free to download. If they save you time, consider supporting the project so I can keep building and sharing.
Comprehensive Active Directory service account discovery, classification, and hygiene reporting. Scans your entire AD forest, identifies stale/orphaned service accounts, maps dependencies, and generates actionable cleanup reports with risk scoring.
# AD Service Account Auditor v2.1
# Identity at the Core Toolkit
Import-Module ActiveDirectory
function Get-StaleServiceAccounts {
param(
[int]$DaysInactive = 90,
[string]$SearchBase,
[switch]$IncludeDisabled
)
$cutoff = (Get-Date).AddDays(-$DaysInactive)
# Discover all service accounts
$svcAccounts = Get-ADUser -Filter {
ServicePrincipalName -ne "$null"
} -Properties LastLogonDate,
PasswordLastSet, SPNs, Description
# Risk scoring algorithm
$svcAccounts | ForEach-Object {
$risk = Calculate-RiskScore $_
$_ | Add-Member RiskScore $risk
}
}Automated SCIM 2.0 compliance testing against any identity provider endpoint. Tests CRUD operations, filtering, pagination, and error handling.
Exports all Conditional Access policies, detects gaps, identifies conflicting rules, and generates a coverage matrix report.
Decode, validate, and analyze JWT/OAuth tokens. Checks signature, expiration, claims, and identifies misconfigurations in token issuance.
Parse, decode, and validate SAML assertions and responses. Highlights common misconfigurations in NameID, AudienceRestriction, and signature validation.
Maps AD group memberships to application access, generating a complete "who has access to what" report with nested group resolution.
Scans your infrastructure for SSL/TLS and authentication certificates approaching expiry. Supports LDAPS, SAML signing certs, and mTLS endpoints.
Suggest a tool and if enough people request it, I'll build it