User Enumeration of Microsoft Teams users via API
☆187Mar 16, 2026Updated this week
Alternatives and similar repositories for TeamsEnum
Users that are interested in TeamsEnum are comparing it to the libraries listed below
Sorting:
- Send phishing messages and attachments to Microsoft Teams users☆1,111Jun 19, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,260Mar 19, 2025Updated last year
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆745Jul 29, 2025Updated 7 months ago
- Azure JWT Token Manipulation Toolset☆720Dec 6, 2024Updated last year
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,373Mar 9, 2026Updated 2 weeks ago
- ☆160Apr 17, 2024Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆611Dec 9, 2025Updated 3 months ago
- A C# utility for interacting with SCCM☆683Aug 20, 2025Updated 7 months ago
- ☆189Nov 21, 2024Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- ☆215Dec 17, 2025Updated 3 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,261Jul 22, 2025Updated 8 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,214Dec 31, 2025Updated 2 months ago
- ☆121Nov 21, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,551Feb 5, 2026Updated last month
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 3 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆398Feb 9, 2026Updated last month
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Feb 10, 2023Updated 3 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆52Jul 18, 2025Updated 8 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆898Mar 11, 2026Updated last week
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆138Dec 7, 2025Updated 3 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive an…☆1,108Updated this week
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆368Jun 24, 2025Updated 8 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆371Jan 29, 2026Updated last month
- Make everyone in your VLAN ASRep roastable☆249Oct 7, 2025Updated 5 months ago
- Parses Snaffler output file and generate beautified outputs.☆137Jan 4, 2026Updated 2 months ago
- Framework for Kerberos relaying☆938May 29, 2022Updated 3 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆238Aug 25, 2024Updated last year
- AADInternals PowerShell module for administering Azure AD and Office 365☆1,607Sep 30, 2025Updated 5 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- ☆234Jun 10, 2025Updated 9 months ago