gremwell / o365enumLinks
Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.
☆284Updated last year
Alternatives and similar repositories for o365enum
Users that are interested in o365enum are comparing it to the libraries listed below
Sorting:
- Python script that performs email address validation against Office 365 without submitting login attempts.☆367Updated 5 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 4 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆221Updated 3 years ago
- scan for NTLM directories☆370Updated 2 months ago
- Active Directory Lab for Penetration Testing☆52Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆496Updated last month
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆361Updated 4 months ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆233Updated 2 years ago
- User enumeration with Microsoft Teams API☆174Updated 4 years ago
- ☆153Updated last week
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆177Updated 4 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆339Updated 6 years ago
- Collection of cyphers for bloodhound☆153Updated last year
- Lookup for interesting stuff in SMB shares☆150Updated 2 years ago
- Kerberoast attack -pure python-☆436Updated last year
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Updated 3 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆236Updated 3 years ago
- Office 365 and Exchange Enumeration☆192Updated 6 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆444Updated 2 years ago
- Microsoft External Attack Tool☆179Updated 2 years ago
- Maximizing BloodHound. Max is a good boy.☆525Updated 6 months ago
- Password Hunter in Active Directory☆198Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraform☆278Updated 6 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆218Updated 5 years ago
- A curated list of awesome BloodhoundAD resources☆235Updated 3 years ago
- Protocol agnostic online password guessing API.☆84Updated 2 years ago
- Open-Source Collection of Social Engineering Pretexts☆142Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆443Updated last year
- Collection of tools that reflect the network dimension into Bloodhound's data☆444Updated 3 years ago
- Modular Enumeration and Password Spraying Framework☆129Updated last year