Synzack / PynAuthLinks
☆36Updated 8 months ago
Alternatives and similar repositories for PynAuth
Users that are interested in PynAuth are comparing it to the libraries listed below
Sorting:
- DEFCON 31 slide deck and video link☆64Updated 2 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆114Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 7 months ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆113Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆130Updated 6 months ago
- ☆105Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 5 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆77Updated 2 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 9 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 9 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 7 months ago
- https://lolad-project.github.io/☆79Updated 7 months ago
- ☆114Updated 4 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆45Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- tool for identifying guest relationships between companies☆101Updated last year
- using graph proxy to monitor teams user presence☆54Updated last year
- Tool to extract powerful tokens from Office desktop apps memory☆71Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated 2 weeks ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- ☆179Updated 8 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆39Updated last month
- Assess Windows OS for security misconfigurations and hardening opportunities.☆34Updated last year
- Azure AD cheatsheet for the CARTP course☆127Updated 3 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 8 months ago