A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't.
☆605Mar 2, 2021Updated 5 years ago
Alternatives and similar repositories for UhOh365
Users that are interested in UhOh365 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 6 months ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆294May 2, 2024Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,561Oct 17, 2022Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A toolkit to attack Office365☆1,119Nov 6, 2020Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- scan for NTLM directories☆387Aug 13, 2025Updated 8 months ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,619Jul 10, 2023Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,080Mar 19, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- Create a minidump of the LSASS process from memory☆260Nov 2, 2022Updated 3 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- Collection of Offensive C# Tooling☆1,470Feb 6, 2023Updated 3 years ago
- retrieve information via O365 and AzureAD with a valid cred☆739Aug 14, 2022Updated 3 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,219Aug 7, 2025Updated 8 months ago
- Targeted Payload Execution☆101Apr 9, 2020Updated 6 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Process Injection☆767Oct 24, 2021Updated 4 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆169Aug 10, 2020Updated 5 years ago
- Extract credentials from lsass remotely☆2,192Mar 23, 2026Updated 3 weeks ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆382Apr 28, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 7 years ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆986Nov 6, 2024Updated last year
- Payload Generation Framework☆1,973Aug 21, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Run PowerShell command without invoking powershell.exe☆1,548Apr 9, 2026Updated last week
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆424Jul 27, 2022Updated 3 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 6 months ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆881Mar 29, 2021Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆249Jun 19, 2024Updated last year
- Tool to create hidden registry keys.☆489Oct 23, 2019Updated 6 years ago
- Search for potential frontable domains☆643Mar 22, 2023Updated 3 years ago