A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is unthrottled, and is incredibly useful for social engineering assessments to find which emails exist and which don't.
☆33Mar 2, 2021Updated 5 years ago
Alternatives and similar repositories for UhOh365
Users that are interested in UhOh365 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Modern problems require modern solutions☆32Nov 22, 2022Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- LDAP library for auditing MS AD☆13Nov 28, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Mar 27, 2019Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆385Mar 5, 2020Updated 6 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- Github Profile Readme☆13Jan 5, 2025Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Slides from various talks that I've given over the years☆118Aug 14, 2023Updated 2 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆527Jan 21, 2022Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆21May 23, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Decryption utility for PGP Whole Disk Encryption☆20Aug 27, 2021Updated 4 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,559Oct 17, 2022Updated 3 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆30Dec 7, 2025Updated 3 months ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Aug 8, 2024Updated last year
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Oct 15, 2017Updated 8 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Obtain the revocation status of an X.509 certificate.☆16Mar 14, 2026Updated 2 weeks ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Jun 13, 2020Updated 5 years ago