alejcas / pyo365Links
A simple python library to interact with Microsoft Graph and Office 365 API
☆18Updated 6 years ago
Alternatives and similar repositories for pyo365
Users that are interested in pyo365 are comparing it to the libraries listed below
Sorting:
- Run PowerShell command without invoking powershell.exe☆12Updated 7 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 8 years ago
- ☆46Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Enumerates employee names from LinkedIn.com based off company search results.☆13Updated 5 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Viewstate Hidden Control Enumerator☆17Updated 11 years ago
- ☆14Updated 7 years ago
- Python bindings for Yeti's API☆18Updated last year
- A simple Nessus results viewer☆49Updated 11 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- PHDAYS |||☆17Updated 12 years ago
- Executes lateral movement through PowerPoint DCOM objects☆19Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago