blackhatethicalhacking / o365-attack-toolkitLinks
A toolkit to attack Office365
☆16Updated 6 years ago
Alternatives and similar repositories for o365-attack-toolkit
Users that are interested in o365-attack-toolkit are comparing it to the libraries listed below
Sorting:
- The New Hacking Framework☆18Updated 8 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆15Updated 6 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- LinkedIn reconnaissance tool☆11Updated 5 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- ☆24Updated 5 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- ☆33Updated 7 months ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆29Updated 5 years ago
- A tool to abuse Exchange services☆18Updated 6 years ago
- A tool for auditing network shares in an Active Directory environment☆43Updated 6 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- ☆12Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- ☆15Updated 6 years ago
- Various scripts and codes☆84Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Nmap Web Dashboard and Reporting☆34Updated 3 years ago
- Blue Team Powershell Script☆18Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Advanced web server fingerprinting☆22Updated 7 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- A library that scrapes Linkedin for user data☆23Updated 4 years ago