blackhatethicalhacking / o365-attack-toolkit
A toolkit to attack Office365
☆16Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for o365-attack-toolkit
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- The New Hacking Framework☆18Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- ☆25Updated 3 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- scripts to setup environments for red/blue teams.☆16Updated 11 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- PowerShell Memory Pulling script☆19Updated 9 years ago
- ☆41Updated 2 months ago
- ☆11Updated 3 years ago
- Scripts and One-Liners☆19Updated 2 weeks ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 3 years ago
- LinkedIn reconnaissance tool☆11Updated 4 years ago
- ☆15Updated 5 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Updated 5 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆11Updated this week
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆22Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- ☆21Updated 3 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆49Updated 7 years ago