ACK-J / MailFailLinks
MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdomain. The extensions UI popup highlights any misconfigurations in red and links to the supporting documentation.
☆77Updated 2 months ago
Alternatives and similar repositories for MailFail
Users that are interested in MailFail are comparing it to the libraries listed below
Sorting:
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆120Updated 2 weeks ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆130Updated 6 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 9 months ago
- Addon for BHCE☆50Updated 4 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆91Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 10 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 5 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 8 months ago
- ☆36Updated 8 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- ☆75Updated 2 weeks ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆14Updated 11 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆64Updated this week
- ☆105Updated last year
- ☆109Updated 9 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated 2 weeks ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆177Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 7 months ago
- Script to perform some hashcracking logic automagically☆73Updated last year
- A Red Team Activity Hub☆218Updated 3 weeks ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated this week
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- ☆55Updated last year
- tool for identifying guest relationships between companies☆101Updated last year