joswr1ght / MSOLSprayLinks
A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the account, if a tenant doesn't exist, if a user doesn't exist, if the account is locked, or if the account is disabled.
☆15Updated 3 years ago
Alternatives and similar repositories for MSOLSpray
Users that are interested in MSOLSpray are comparing it to the libraries listed below
Sorting:
- ☆26Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- Assess Windows OS for security misconfigurations and hardening opportunities.☆34Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 10 months ago
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 7 months ago
- ☆47Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 8 months ago
- God Mode Detection Rules☆134Updated last year
- ☆115Updated 4 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆157Updated 2 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- ☆40Updated 10 months ago
- DShield Sensor Log Collection with ELK☆42Updated 3 weeks ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- List of Command&Control (C2) software☆44Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- ☆160Updated last year
- ☆74Updated last week
- Ransomware simulator written in C#☆37Updated 3 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆61Updated last year
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆121Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year