Federated Office365 user enumeration based on correlated response trend analysis
☆49May 3, 2022Updated 3 years ago
Alternatives and similar repositories for o365fedenum
Users that are interested in o365fedenum are comparing it to the libraries listed below
Sorting:
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- ☆254Sep 28, 2023Updated 2 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- ADCS abuser☆317Feb 6, 2023Updated 3 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆52Jul 18, 2025Updated 8 months ago
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 10 months ago
- Collection of offensive tools targeting Microsoft Azure☆219Jan 18, 2023Updated 3 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆40Dec 5, 2025Updated 3 months ago
- ☆44Oct 16, 2023Updated 2 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆131Oct 10, 2021Updated 4 years ago
- ☆39Mar 25, 2021Updated 4 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Jul 12, 2023Updated 2 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- ☆16May 20, 2022Updated 3 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,260Mar 19, 2025Updated last year
- Beacon Object Files for roasting Active Directory☆236Feb 21, 2022Updated 4 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆268Apr 4, 2025Updated 11 months ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Jan 7, 2022Updated 4 years ago
- A C# utility for interacting with SCCM☆683Aug 20, 2025Updated 7 months ago
- A SOCKS proxy for Citrix.☆97Dec 8, 2022Updated 3 years ago
- ☆418Apr 28, 2021Updated 4 years ago