alejcas / pyo365
A simple python library to interact with Microsoft Graph and Office 365 API
☆18Updated 6 years ago
Alternatives and similar repositories for pyo365:
Users that are interested in pyo365 are comparing it to the libraries listed below
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- ☆52Updated 9 years ago
- Hunting system admins with Powershell/WMI☆13Updated 10 years ago
- ☆58Updated 7 years ago
- Run PowerShell command without invoking powershell.exe☆12Updated 7 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Leak File Analyzer☆62Updated 7 years ago
- ☆17Updated 10 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 7 years ago
- Opening CobaltStrike to a wider world☆8Updated 6 years ago
- PowerShell module to play with Kerberos S4U extensions☆51Updated 7 years ago
- ☆39Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Scripts to query local admins quickly☆9Updated 8 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Imports an LDAP file from Active Directory for SQL based offline reconnisance☆52Updated 8 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆73Updated 5 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- SMB Named Pipe shell☆63Updated 2 months ago
- Offensive Data Storage☆58Updated 8 years ago
- Executes lateral movement through PowerPoint DCOM objects☆19Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago