TheresAFewConors / MSSprinklerView external linksLinks
MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It employs a 'low-and-slow' approach to avoid locking out accounts, and provides verbose information related to accounts and tenant information.
☆79Jan 22, 2026Updated 3 weeks ago
Alternatives and similar repositories for MSSprinkler
Users that are interested in MSSprinkler are comparing it to the libraries listed below
Sorting:
- PoC☆12Apr 7, 2025Updated 10 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆245Nov 2, 2025Updated 3 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Jan 27, 2025Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated 3 weeks ago
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last week
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆260Nov 22, 2025Updated 2 months ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 4 months ago
- Tool to remotely dump secrets from the Windows registry☆522Nov 18, 2025Updated 2 months ago
- ☆198Mar 28, 2025Updated 10 months ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated 11 months ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆534May 9, 2025Updated 9 months ago
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- ☆40Oct 8, 2024Updated last year
- Your template-based BloodHound terminal companion tool☆446Jan 21, 2026Updated 3 weeks ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Feb 11, 2025Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Sep 20, 2024Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- ☆13Apr 14, 2024Updated last year
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆18Feb 22, 2024Updated last year
- Detect AES and RSA keys in a memory dump.☆14Jul 28, 2016Updated 9 years ago
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆26Jun 12, 2024Updated last year
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 8 months ago
- ☆42Sep 28, 2024Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆133Jul 22, 2025Updated 6 months ago
- Parses Snaffler output file and generate beautified outputs.☆132Jan 4, 2026Updated last month
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆20Nov 24, 2025Updated 2 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆376Jan 23, 2025Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Oct 9, 2024Updated last year
- PowerShell script to generate ShellCode in various formats☆46Sep 25, 2024Updated last year
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆419Sep 29, 2025Updated 4 months ago