User Enumeration of Microsoft Teams users via API
☆188Mar 16, 2026Updated 2 months ago
Alternatives and similar repositories for TeamsEnum
Users that are interested in TeamsEnum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Send phishing messages and attachments to Microsoft Teams users☆1,112Jun 19, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 5 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,276Mar 19, 2025Updated last year
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆754Jul 29, 2025Updated 9 months ago
- Azure JWT Token Manipulation Toolset☆730Dec 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,388Mar 9, 2026Updated 2 months ago
- ☆164Apr 17, 2024Updated 2 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆638Apr 2, 2026Updated last month
- A C# utility for interacting with SCCM☆688Mar 30, 2026Updated last month
- ☆199Nov 21, 2024Updated last year
- Initial Access and Post-Exploitation Tool for Entra ID and M365 with a browser-based GUI☆1,290May 4, 2026Updated 2 weeks ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆309Mar 28, 2026Updated last month
- Azure Post Exploitation Framework☆247Oct 27, 2025Updated 6 months ago
- ☆219Dec 17, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,284Apr 9, 2026Updated last month
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,602Feb 5, 2026Updated 3 months ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14May 7, 2026Updated 2 weeks ago
- ☆123Nov 21, 2024Updated last year
- Abusing Azure services over C2☆372Jan 20, 2026Updated 4 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆420Apr 12, 2026Updated last month
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Feb 10, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆53Jul 18, 2025Updated 10 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆917May 7, 2026Updated 2 weeks ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆139Dec 7, 2025Updated 5 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆1,133May 13, 2026Updated last week
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆375Jun 24, 2025Updated 10 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆393Apr 26, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Make everyone in your VLAN ASRep roastable☆256Oct 7, 2025Updated 7 months ago
- Framework for Kerberos relaying☆948May 29, 2022Updated 3 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆242Aug 25, 2024Updated last year
- AADInternals PowerShell module for administering Azure AD and Office 365☆1,645Sep 30, 2025Updated 7 months ago
- Parses Snaffler output file and generate beautified outputs.☆144Jan 4, 2026Updated 4 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- ☆236Jun 10, 2025Updated 11 months ago