TheresAFewConors / MSSprinkler
MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It employs a 'low-and-slow' approach to avoid locking out accounts, and provides verbose information related to accounts and tenant information.
☆74Updated last month
Alternatives and similar repositories for MSSprinkler:
Users that are interested in MSSprinkler are comparing it to the libraries listed below
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆108Updated 3 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆162Updated 4 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆48Updated last week
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆142Updated 2 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 9 months ago
- Parses Snaffler output file and generate beautified outputs.☆71Updated 3 weeks ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- PowerShell Reverse Shell☆61Updated last year
- ☆147Updated 11 months ago
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- https://lolad-project.github.io/☆71Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆73Updated 2 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆112Updated this week
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 8 months ago
- ☆36Updated 10 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆85Updated last month
- Living off the land searches for explorer and sharepoint☆56Updated 3 months ago
- Azure Post Exploitation Framework☆163Updated 3 weeks ago
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆113Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆158Updated 2 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆67Updated last month
- linikatz is a tool to attack AD on UNIX☆142Updated last year
- BloodHound PowerShell client☆49Updated this week
- Automatically run and populate a new instance of BH CE☆64Updated 4 months ago