blackhatethicalhacking / o365-attack-toolkit
A toolkit to attack Office365
☆16Updated 5 years ago
Alternatives and similar repositories for o365-attack-toolkit:
Users that are interested in o365-attack-toolkit are comparing it to the libraries listed below
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- The New Hacking Framework☆18Updated 7 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆29Updated 5 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- LinkedIn reconnaissance tool☆11Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Updated 3 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- ☆33Updated 3 months ago
- ☆12Updated 4 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 3 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Updated 5 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 5 years ago
- Scripts and One-Liners☆21Updated 2 months ago
- All the useful tools interesting to be used☆23Updated 2 years ago
- Nmap Web Dashboard and Reporting☆34Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago