byt3bl33d3r / UhOh365
A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't.
☆29Updated 3 years ago
Alternatives and similar repositories for UhOh365:
Users that are interested in UhOh365 are comparing it to the libraries listed below
- SMBMap is a handy SMB enumeration tool☆37Updated 7 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- A simple "ransomware" using powershell☆13Updated 3 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Custom pentesting tools☆24Updated 4 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆11Updated 5 years ago
- HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows – CVE-2021-36934☆8Updated 3 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆95Updated 3 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆24Updated 4 years ago
- Fully-featured spear-phishing toolkit - web front-end☆50Updated last week
- Modern problems require modern solutions☆31Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 3 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago