boringthegod / AzureEmailCheckerLinks
Tool written in Rust to enumerate the valid email addresses of an Azure/Office 365 Tenant
☆14Updated last year
Alternatives and similar repositories for AzureEmailChecker
Users that are interested in AzureEmailChecker are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆79Updated 6 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 3 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆139Updated 11 months ago
- pysnaffler☆102Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆155Updated 7 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- Compile SharpHound and others on Linux☆24Updated last year
- ☆160Updated 3 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆151Updated 9 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆192Updated 11 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 11 months ago
- A cross platform library to write offensive and defensive security tools in Go☆121Updated 3 weeks ago
- ☆95Updated 7 months ago
- Parses Snaffler output file and generate beautified outputs.☆107Updated 8 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆237Updated 3 weeks ago
- Python utility that generates "imageless" QR codes in various formats☆129Updated last year
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆67Updated 9 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆171Updated last week
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆116Updated 2 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 5 months ago
- Access All Networks: an offensive multitool against 802.1X☆17Updated last month
- ☆212Updated 3 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- A community-driven collection of BloodHound queries☆145Updated this week
- Detect common NFS server misconfigurations☆66Updated 4 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- ☆112Updated 3 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆97Updated 2 weeks ago