mlcsec / Graphpython
Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit
☆139Updated last month
Alternatives and similar repositories for Graphpython:
Users that are interested in Graphpython are comparing it to the libraries listed below
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆154Updated 4 months ago
- ☆174Updated last month
- Parses Snaffler output file and generate beautified outputs.☆59Updated 4 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆105Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆161Updated 3 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆95Updated 10 months ago
- ☆71Updated last month
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆72Updated last month
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆133Updated 5 months ago
- linikatz is a tool to attack AD on UNIX☆138Updated last year
- ☆179Updated last month
- ☆145Updated 10 months ago
- Azure AD cheatsheet for the CARTP course☆102Updated 2 years ago
- ☆185Updated 3 months ago
- ☆136Updated last month
- Hybrid AD utilities for ROADtools☆67Updated last month
- ☆53Updated last year
- A Python POC for CRED1 over SOCKS5☆139Updated 3 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 7 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆104Updated 4 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆92Updated 2 months ago
- Automatically run and populate a new instance of BH CE☆59Updated 3 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆124Updated last week
- Find potential DLL Sideloads on your windows computer☆168Updated this week
- Azure DevOps Services Attack Toolkit☆137Updated 5 months ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆106Updated 2 years ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆158Updated 3 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆170Updated 5 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆201Updated 3 weeks ago